CN104081406A - Application licensing using sync providers - Google Patents
Application licensing using sync providers Download PDFInfo
- Publication number
- CN104081406A CN104081406A CN201380006979.7A CN201380006979A CN104081406A CN 104081406 A CN104081406 A CN 104081406A CN 201380006979 A CN201380006979 A CN 201380006979A CN 104081406 A CN104081406 A CN 104081406A
- Authority
- CN
- China
- Prior art keywords
- office
- licence
- user
- frame
- license
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract description 272
- 230000001360 synchronised effect Effects 0.000 claims description 108
- 230000007704 transition Effects 0.000 claims description 6
- 238000003780 insertion Methods 0.000 claims 1
- 230000037431 insertion Effects 0.000 claims 1
- 238000003860 storage Methods 0.000 abstract description 26
- 238000012797 qualification Methods 0.000 description 110
- 230000008569 process Effects 0.000 description 90
- 238000010586 diagram Methods 0.000 description 72
- 238000013475 authorization Methods 0.000 description 19
- 238000001514 detection method Methods 0.000 description 13
- 230000009471 action Effects 0.000 description 12
- 230000004044 response Effects 0.000 description 12
- 230000008859 change Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 9
- 230000000694 effects Effects 0.000 description 8
- 238000007689 inspection Methods 0.000 description 7
- 238000009434 installation Methods 0.000 description 7
- 230000004913 activation Effects 0.000 description 6
- 230000000712 assembly Effects 0.000 description 6
- 238000000429 assembly Methods 0.000 description 6
- 239000007858 starting material Substances 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000011084 recovery Methods 0.000 description 5
- 230000003213 activating effect Effects 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 4
- 238000005859 coupling reaction Methods 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 4
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 4
- 238000013500 data storage Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 241001269238 Data Species 0.000 description 2
- 241000700605 Viruses Species 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000001276 controlling effect Effects 0.000 description 2
- 230000005055 memory storage Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 230000000717 retained effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000011900 installation process Methods 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services; Handling legal documents
- G06Q50/184—Intellectual property management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1073—Conversion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1075—Editing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1076—Revocation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1077—Recurrent authorisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
- G06Q2220/10—Usage protection of distributed data files
- G06Q2220/18—Licensing
Abstract
A method, system, and computer-readable storage media for licensing an application (220) using sync providers are provided herein. The method includes receiving (2502) a request for a license for an application (220) from a client sync provider (304D) at a licensing service (302) and receiving (2504) information relating to the license from a commerce partner offering the application (220) via a commerce partner sync provider. The method also includes returning (2506) the license for the application (220) to a client computing device (308), receiving (2508) information relating to a state of the license from the client sync provider (304D), and adjusting (2510) conditions of the license according to the state of the license.
Description
Background
License or qualification are generally used for controlling the mode of the addressable application-specific of client computes equipment (such as for example, text processing application, spreadsheet application and demonstration application).Conventionally, the client computes equipment of each type has different licensed service, and wherein the client computes equipment of the type for example can comprise, the specific operation system (OS) of client computes equipment or the brand of client computes equipment.But, use this type of different licensed service of the client computes equipment of each type to cause some restrictions.For example, expensive can being associated with setting up and maintain for the independent licensed service of the client computes equipment of each type.In addition, it may be desirable providing binding to propose, binding proposes to comprise the licence of one or more application that can use on polytype client computes equipment.But, use independent licensed service can get rid of this type of binding and propose, because binding depends on integrated between much dissimilar equipment or system.In addition,, for market service, mutually integrated with each independent licensed service may be difficult to sell these licences, and the proprietorial consistent proof that may be difficult to get a license.For example, a licensed service can be used product key, and another licensed service can be used token.
General introduction
Present simplification general introduction of the present invention below, to the key concept of some aspect described herein is provided.This general introduction is not the detailed general introduction of theme required for protection.Neither point out the key element of theme required for protection, neither describe scope of the present invention in detail.Unique object is some concept that presents in simplified form theme required for protection, as the prelude of the more detailed description presenting after a while.
An embodiment provides a kind of for carry out the method for approved applications with synchronous supplier.The method is included in licensed service place and receives the request of the licence to application from the synchronous supplier of client computer, and receives the information relevant with this licence via the synchronous supplier of Business Partner from the Business Partner who proposes this application.The method also comprises the licence that returns to this application to client computes equipment, and from this client computer, synchronous supplier receives the information relevant with the state of this licence, and adjusts the condition of this licence according to the state of this licence.
It is a kind of for carry out the system of approved applications with synchronous supplier that another embodiment provides.This system comprises the synchronous supplier of client computer, it is configured to receive supply request via the synchronous supplier of Business Partner from Business Partner, send request the system call of the licence of application to licensed service, and periodically determine and upgrade the state of this licence.This system also comprises licensed service, and it is configured to return to client computes equipment the licence of this application, and from this client computer, synchronous supplier receives the information relevant with the state of this licence, and adjusts the condition of this licence according to the state of this licence.
Another embodiment provides one or more computer-readable recording mediums that comprise multiple instructions, in the time that being executed by processor, this instruction causes this processor: receive the request of the licence to application from the synchronous supplier of client computer, and receive the information relevant with this licence from the synchronous supplier of Business Partner corresponding to the Business Partner who proposes this application.This instruction also causes this processor: return to the licence of this application to client computes equipment, determine the information relevant with the state of this licence, and adjust the condition of this licence according to the state of this licence.
It is in order to introduce some concepts with the form of simplifying that this general introduction is provided; These concepts will be further described in following embodiment.This general introduction is not intended to identify key feature or the essential feature of claimed subject, is not intended to the scope for limiting claimed subject yet.
Brief description of the drawings
Fig. 1 is the block diagram that can be used for the networked environment of realizing licensed service described herein;
Fig. 2 is the block diagram that can be used for the computing environment that realizes licensed service described herein;
Fig. 3 A, 3B and 3C illustrate the schematic diagram of the licensing system that can be used for the licence of managing each application;
Fig. 4 is the process flow diagram flow chart of the method for the licence for buy application by market service;
Fig. 5 is the process flow diagram flow chart of the method for the licence for applying by market service initial activation;
Fig. 6 is the process flow diagram flow chart of the method for the licence for reactivating application;
Fig. 7 illustrates to the multiple qualifications for multiple different machines of user's license or the block diagram of licence;
Fig. 8 is the process flow diagram flow chart of the method for qualification being converted to another proposal or the renewal proposal relevant with this qualification;
Fig. 9 be for the identity of authentication of users and to its supply the process flow diagram flow chart without the method for the identity of the qualification of key authorization;
Figure 10 is for supplying in due course the process flow diagram flow chart without the method for key authorization;
Figure 11 A is the process flow diagram flow chart of the method for retrieving existing subscription (or TBL) key;
Figure 11 B is the process flow diagram flow chart of the method for obtaining new subscription;
Figure 12 A is the process flow diagram flow chart of the method for retrieving existing product key;
Figure 12 B is the process flow diagram flow chart of the method for obtaining new product key;
Figure 13 is the process flow diagram flow chart for retrieve the method for each machine according to qualification;
Figure 14 is the process flow diagram flow chart of the method for cancel supply particular machine according to qualification;
Figure 15 A is the process flow diagram flow chart that user initially buys the method for qualification;
Figure 15 B is the process flow diagram flow chart of the method for upgrading qualification;
Figure 16 is the process flow diagram flow chart for supply or user is transformed into from a kind of qualification the method for another kind of qualification to user at OLS;
Figure 17 is for determining whether the process flow diagram flow chart of the method that will upgrade qualification according to ForcedUpdate (forcing to upgrade) process;
Figure 18 A is the process flow diagram flow chart for the method for the application of initial permitted device;
Figure 18 B is the process flow diagram flow chart of the method for the state for periodically checking licence;
Figure 19 is the process flow diagram flow chart for the method for initial permitted device;
Figure 20 is that partner determines whether user is awarded the process flow diagram flow chart of the method for the access right to its service;
Figure 21 is the schematic diagram of the exemplary configuration at master data center and multiple copy datas center;
Figure 22 is the schematic diagram illustrating for the first step of executive plan stop time;
Figure 23 is the schematic diagram for the second step of executive plan stop time;
Figure 24 is the process flow diagram flow chart of the method for applying license;
Figure 25 is the process flow diagram flow chart for carry out the method for approved applications with synchronous supplier;
Figure 26 is the process flow diagram flow chart for carry out the method for approved applications with the license of various ways;
Figure 27 is for permitting the process flow diagram flow chart for the method for the application of each equipment; And
Figure 28 is the process flow diagram flow chart of the method for the license based on user to application is provided.
Embodiment
Each embodiment disclosed herein sets forth the method and system for permitting according to the application of various criterions and technology.As used herein, term " application " can refer to the application, program or the service that in computing environment, realize.Each application that can use according to licensed service described herein includes but not limited to, MICROSOFT WORD, MICROSOFT EXCEL, MICROSOFT POWERPOINT, MICROSOFT VISIO or MICROSOFT SHAREPOINT, all these application all can be covered Microsoft of city from Washington state Randt and be obtained.Each application can be provided to computing equipment via network by any in market service or multiple third party service.Various dissimilar licence or qualification for this type of application can be obtained by various method.
Licensed service described herein can be expanded and consistent method is permitted New Client computing equipment by providing, thereby has solved the problem about using independent licensed service discussed above.In addition, licensed service, by admission process and purchasing process are kept apart, allows easily sales applications of new partner (, Business Partner).In addition, licensed service is enabled the proposal (offer) of crossing over different client computer or client devices.Licensed service also allows the user of different client computer to prove that it is supplied to use application via single group voucher.In addition,, even when equipment rolls off the production line, licensed service also allows to comprise the synchronous permitted hours section of striding equipment and service.This also allows the experience in all devices and service in the time that subscription is passed to be in time consistent.
Licensed service can be called as " Office licensed service " or " OLS " herein, because it can be used for permitting MICROSOFT OFFICE, that is, " Office " application that can obtain from Microsoft corporation, Redmond, Washington, such as each application listed above.But, should be appreciated that licensed service also can be used for the application of license from obtainable any other adequate types of any amount of supplier.
In each embodiment, OLS provides the ability that uses multiple Licensing Methods by consistent, deployable and clearly defined one group of agreement.This type of Licensing Methods for example can comprise, the license based on product key, the license based on online user, the license based on equipment and the license based on token etc.
In certain embodiments, OLS is configured to periodically check user's License Status.This can allow off-line to use the ability of product and obtain for example, balance between the ability of up-to-date License Info (, whether having cancelled supply license).User's License Status can be called as " subscription heartbeat " (subscription heartbeat).Subscribe to heartbeat and can be used to determine whether to forbid the licence of application, the corresponding application of stopping using thus.
OLS can across multiple equipment and service provide user license state synchronously.In certain embodiments, OLS makes to move each equipment (for example, PC, Mac or flat-panel devices etc.) of Office and Office service (for example, roaming arranges) can have consistent license state.Therefore,, in the time that user's subscription is passed in time, may be cut off the access of client computer and service simultaneously.In addition, by the default off-line permitted hours amount that allows particular device, even user offline, License Status also can be by synchronously.
In addition, OLS can provide the fault-tolerant of off-line client computer and the detection to swindle.For example, OLS can comprise and determines the logic that when asks for permission New Client when card contrast existing customer machine ask to renew licence.OLS also can comprise determining when user carries out fraudulent activities (such as the excessive new permit of request), still allow user add and removing device simultaneously and safeguard the logic of the active equipment of specific quantity.
In each embodiment, OLS provides the license of equipment.For example, OLS can provide the license of MOX equipment, and wherein term " MOX " generally refers to all Windows 8 flat-panel devices.OLS can provide this type of license with voucher and OLS licence.OLS licence is the licence of authorizing different new models from the tradition of authorizing via product key.OLS licence can comprise the configurable licence supervision time section for example, configuring from the outside server of legacy system (, traditional Office software protection platform (OSPP) system).
In each embodiment, the service available license of OLS.Particularly, OLS can provide scalable mode to use polling model that the license of service is provided, and wherein service can be inquired about OLS in due course.OLS can in special time amount, supply/License Info be cached at service or client computer from it, to make system scalable.In addition, pushing module can be used to provide the license of service.
OLS can allow disaster restoring force.For example, approaching zero day recovery point and approach zero minutes release time can be via keep the synchronous server distributing geographically to realize with the geographical replicated logic of customization.This can be by will keeping synchronous information with the unpack that can synchronize to a certain extent and complete via synchronous this information in synchronous supplier pond subsequently all the time.In addition, locking mechanism can be used to avoid overwrite.
In addition, OLS provides the license based on user.For using the License Info of rich client application to be sent out from server, and log-on message that can be based on user.License Info can be retained on server instead of in client computer, and License Info can be roamed with user on server.This can be used in multiple scenes, such as applying or used previous initial acquisition for the license based on key for roaming.
As preliminary matter, some accompanying drawings are to describe concept in one or more construction packages context of (being differently called function, module, feature, element etc.).Various assemblies shown in accompanying drawing can be realized by any way, for example, and for example, by software, hardware (, discreet logic assembly etc.), firmware etc., or any combination of these realizations.In one embodiment, each assembly can reflect the use of corresponding assembly in reality realizes.In other embodiments, any single component shown in accompanying drawing can be realized by multiple actual component.To any two or more the independent assemblies in accompanying drawing describe can reflect the difference in functionality performed by single actual component.Fig. 1 discussed below provides about the details of a system that can be used for realizing the each function shown in accompanying drawing.
Other accompanying drawings with process flow diagram formal description concept.With this form, some operation is described to form the different frame of carrying out with a certain order.These realizations are exemplary and nonrestrictive.Some frame described herein can be grouped in together and in single operation to be carried out, and some frame can be divided into multiple component blocks, and some frame can by from shown here go out different order carry out (comprise with parallel mode and carry out these frames).Frame shown in process flow diagram can be realized by any combination of software, hardware, firmware, manual handle, these realizations etc.As used herein, hardware can comprise computer system, discreet logic assembly such as special IC (ASIC) etc. and their combination in any.
About term, phrase " is configured to " contain the function that can construct any kind carries out any mode of identified operation.Function can be configured to use, and for example, software, hardware, firmware etc. or its any combination carry out executable operations.
Any function for executing the task contained in term " logic ".For example, each shown in process flow diagram operates corresponding to the logic for carrying out this operation.Operation can be used, and for example, software, hardware, firmware etc. or its any combination are carried out.
As used herein, term " assembly ", " system ", " client computer " etc. are intended to refer to the entity that computing machine is relevant, and they can be hardware, (for example, executory) software and/or firmware or its combination.For example, assembly can be, process, object, executable code, program, function, storehouse, the subroutine on processor, moved, and/or the combination of computing machine or software and hardware.
As explanation, the application and service device moving on server can be both assembly.One or more assemblies can reside in process, and assembly can and/or be distributed between two or more computing machines in a computing machine.Term " processor " is generally understood to refer to nextport hardware component NextPort, such as the processing unit of computer system.
In addition, theme required for protection can be controlled computing machine and is embodied as method, device or goods with standard program and/or the engineering of the software, firmware, hardware or its combination in any that realize disclosed theme with producing.Be intended to contain can be from the computer program of any computer readable storage devices or medium access for term " goods " as used herein.
Computer-readable recording medium comprises that memory device (for example, hard disk, floppy disk and tape etc.), CD (for example, compact-disc (CD) and digital versatile disc (DVD) etc.), smart card and flash memory device (for example, card, rod and key actuated device etc.).On the contrary, computer-readable medium (, non-storage media) can additionally comprise the communication media for signal of communication and so on, such as transmission medium.
In addition the word " exemplary " using herein, means as example, example or explanation.Be described to aspect " exemplary " any or design might not be interpreted as comparing other side or design more preferably or favourable at this.
computing environment
In order to be provided for the context of the various aspects that realize theme required for protection, Fig. 1-2 and discussion below aim to provide concise and to the point, the general description of the computing environment that wherein can realize various aspects of the present invention.For example, a kind of method and system for approved applications can be realized in this type of computing environment.Although described theme required for protection in the general context of computer executable instructions that operates in the computer program on local computer and/or remote computer above; but those skilled in the art will recognize that the present invention also can realize in conjunction with other program module.Generally speaking, program module comprises the routine, program, assembly, data structure etc. carrying out particular task or realize particular abstract data type.
In addition, it will be appreciated by those skilled in the art that, method of the present invention can be implemented by other computer system configurations, comprise uniprocessor or multiprocessor computer system, minicomputer, mainframe computer and personal computer, Handheld computing device, based on microprocessor or programmable consumer electronics etc., its each can operate and one or more devices communicatings that are associated.In the illustrated aspect of the theme required for protection distributed computing environment that also task is carried out by the teleprocessing equipment linking by communication network therein, realize.But, some aspect of the present invention, if not all aspects, can on stand-alone computer, implement.In distributed computing environment, program module can be arranged in Local or Remote memory storage device.
Fig. 1 is the block diagram that can be used for the networked environment 100 of realizing licensed service described herein.Networked environment 100 comprises one or more client computer 102.Client computer 102 can be hardware and/or software (for example, thread, process or computing equipment).Networked environment 100 also comprises one or more servers 104.Server 104 can be hardware and/or software (for example, thread, process or computing equipment).Server 104 can, for example, the application of the invention, preserves and carries out the thread of search operation.
A kind of possible communication between client computer 102 and server 104 can be the form that is applicable to the packet transmitting between two or more computer processes.Networked environment 100 comprises the communications framework 108 that can be used for promoting communication between (all) client computer 102 and (all) servers 104.Client computer 102 is operably connected to one or more client data storages 110, can carry out with these client data storeies the information of storage client 102 this locality.Client data storage 110 can be stored in client computer 102, or is positioned at the long-range of client computer 102, such as in Cloud Server.Similarly, server 104 is operably connected to one or more server data stores 106, can carry out by these server data storages the information of storage server 104 this locality.
Fig. 2 is the block diagram that can be used for the computing environment that realizes licensed service described herein.Computing environment 200 comprises computing machine 202.Computing machine 202 comprises processing unit 204, system storage 206 and system bus 208.System bus 208, by system component, include but not limited to, and system storage 206 is coupled to processing unit 204.Processing unit 204 can be any in various available processors.Also can use dual micro processor and other multiprocessor architectures as processing unit 204.
System bus 208 can be the bus structure of arbitrary class in some types, comprises memory bus or Memory Controller, peripheral bus or external bus or uses the local bus of any various available bus frameworks known to those skilled in the art.System storage 206 is the computer-readable recording mediums that comprise volatile memory 210 and nonvolatile memory 212.Basic input/output (BIOS) is stored in nonvolatile memory 212, for example comprises in the basic routine of transmission information between the element in computing machine 202 between the starting period.As explanation, instead of restriction, nonvolatile memory 212 can comprise ROM (read-only memory) (ROM), programmable read-only memory (PROM) (PROM), electrically programable ROM (EPROM), electrically erasable programmable ROM (EEPROM) or flash memory.
Volatile memory 210 comprises the random access memory (RAM) of serving as external cache.As explanation instead of restriction, RAM can have many forms, as SDRAM (ESDRAM), the synchronization link of static RAM (SRAM) (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), Double Data Rate SDRAM (DDRSDRAM), enhancing
tMdRAM (SLDRAM), Direct-type
rAM (RDRAM), Direct-type
dynamic ram (DRDRAM) and
dynamic ram (RDRAM).
Computing machine 202 also comprises other computer-readable recording mediums, such as removable/irremovable, volatile/nonvolatile computer storage media.Fig. 2 shows for example disk storage 214.Disk storage 214 includes but are not limited to, the equipment such as disc driver, floppy disk, tape drive, Jaz driver, Zip drive, LS-100 driver, flash card or memory stick.
In addition, disk storage 214 also can comprise storage medium, combine dividually or with other storage mediums, comprise, but be not limited only to, the CD drive such as compact-disc ROM equipment (CD-ROM), CD can record driver (CD-R driver), CD recordable drive (CD-RW driver) or digital versatile disc ROM driver (DVD-ROM).Be connected to system bus 208 for ease of disk storage 214, conventionally use the removable or irremovable interface such as interface 216.
Should be understood that Fig. 2 has described the software of taking on intermediary between the basic computer resources of describing user with in computing environment 200.Such software comprises operating system 218.Can be stored in operating system 218 in disk storage 214 for controlling and the resource of Distribution Calculation machine 202.
System applies 220 is utilized by operating system 218 by being stored in system storage 206 or being stored in program module 222 and the management of routine data 224 to resource in disk storage 214.Be appreciated that theme required for protection can utilize the combination of various operating system or operating system to realize.
User passes through input equipment 226 to computing machine 202 input commands or information.Input equipment 226 includes but not limited to pointing device (such as mouse, tracking ball, stylus etc.), keyboard, microphone, posture or touch input device, voice-input device, operating rod, satellite dish, scanner, TV tuner card, digital camera, Digital Video, IP Camera etc.Input equipment 226 is connected to processing unit 204 by system bus 208 via interface port 228.Interface port 228 comprises, for example, and serial port, parallel port, game port and USB (universal serial bus) (USB).Output device 230 and input equipment 226 use the port of some same types.Thus, for example, can provide input to computing machine 202 by USB port, and from computing machine 202 to output device 230 output informations.
Provide o adapter 232, with some output devices 230 shown with picture monitor, loudspeaker and printer and so on, other output devices 230 that can access by o adapter 232 in addition.O adapter 232 comprises, as explanation instead of restriction, provides video card and the sound card of coupling arrangement between output device 230 and system bus 208.Can note, the system of other equipment and/or equipment provides the input and output such as remote computer 234 two kinds of functions.
Computing machine 202 can be the server that the logic that uses one or more remote computers (such as, remote computer 234) is connected to main memory event prediction system in networked environment 100.Remote computer 234 can be the client machine system that is equipped with web browser, PC application, mobile phone application etc.Remote computer 234 can be personal computer, server, router, network PC, workstation, electrical equipment, mobile phone, peer device or other common network node based on microprocessor etc., and generally includes the described many or whole elements of reference computers 202 above.For simplicity, show memory storage device 236 together with remote computer 234.Remote computer 234 is logically connected to computing machine 202 via network interface 238, then physically connects via communication connection 240.
Network interface 238 comprises the wired or wireless communication network such as LAN (Local Area Network) (LAN) and wide area network (WAN).Lan technology comprises Fiber Distributed Data Interface (FDDI), copper distributed data interface (CDDI), Ethernet, token-ring network etc.WAN technology includes, but not limited to point-to-point link, Circuit Switching Network, as ISDN (Integrated Service Digital Network) (ISDN) with and variant, packet switching network and Digital Subscriber Line (DSL).
Communication connection 240 hardware/softwares that refer to for network interface 238 being connected to system bus 208.Although be shown in computing machine 202 inside for communicating to connect 240 for the purpose of clear,, it also can be positioned at computing machine 202 outsides.The hardware/software that is connected to network interface 238 can comprise, for example, and inside and outside technology, as, mobile telephone switch, modulator-demodular unit, comprises routine call hierarchical modulation detuner, cable modem and DSL modulator-demodular unit, ISDN adapter and ethernet nic.
licensing system
Fig. 3 A, 3B and 3C illustrate the schematic diagram of the licensing system 300 that can be used for the licence of managing each application.Licensing system 300 is described with reference to Office licensed service (OLS) 302, and OLS 302 is for managing the license of each Office application or the license of each application that management can obtain by Office.But, should be appreciated that licensing system 300 also can be used for managing application or the service of any other applicable type.
Licensing system 300 can comprise multiple synchronous supplier 304A-D.Synchronous supplier 304A-D be allow licensing system 300 extensibility and without amendment OLS 302 can plug-in package.Synchronous supplier 304A-D can allow multiple Business Partners and OLS 302 mutual.For example, as shown in Figure 3A, the synchronous supplier 304A of Microsoft online (MSOnline) can allow between OLS 302 and MSOnline partner 306A alternately.Office market experience (OMEX) synchronous supplier 304B can allow between OLS 302 and OMEX partner 306B alternately.The synchronous supplier 304C of point-of-sale activation (POSA) can allow between OLS 302 and POSA partner 306C alternately.
In addition, the synchronous supplier 304D of client computer can allow mutual between OLS 302 and client computes equipment 308.Client computes equipment 308 can be to use OLS 302 to permit the computing equipment (such as desk-top computer or laptop computer) of any adequate types of application-specific or service to user via licensing system 300.In addition, any amount of new Business Partner also can be integrated into licensing system 300 with any amount of appended synchronization supplier.
As shown in Figure 3A, each synchronous supplier 304A, 304B, 304C and 304D can comprise the one or more assemblies for carrying out the action that each partner 306A, 306B, 306C and 308D ask.In addition, each synchronous supplier 304A, 304B, 304C and 304D respectively can with OLS 302 in one or more supply application programming interface (API) 310 mutual, as indicated via arrow 312A, 312B, 312C and 312D.Supply API 310 is used for carrying out supply action by OLS 302.The source (such as synchronous supplier 304A-D) of calling supply API310 is generally assumed that trusted sources.
OLS?API
OLS 302 can comprise multiple OLS API 314, and these OLS API 314 are for from OLS 302 retrieving informations, and for sending and receiving the information from client computes equipment 308.OLS API 314 can be called by the Office license client computer (OLC) 316 of client computes equipment 308, as arrow 318A and 318B indicated.OLS API 314 also can call by expecting to send or obtain from the machine of OLS 302 or any service of License Info or website 320A and 320B, as arrow 322A, 322B and 322C instruction.For example, OLS API 314 can carry out the action such as inspection product key or user's supply status or retrieval product key.
In certain embodiments, there are two groups of OLS API 314, comprise the public version that can call by access to the Internet and by OLC, and the specific versions that can only access and be called by those partners by particular trusted partner.The public version of OLS API 314 and the Main Differences of specific versions are, specific versions can be accepted the unique ID of the pass (PUID) as identity instead of user's voucher, and specific versions can be used different server and be realized as the end points different from public version.
The OLC 316 of client computes equipment 308 be processing client side licensing function (such as, communicate with OLS304, via OSPP 324 activate licence, with UI interface and provide mandate for move Office 326 on client computes equipment 308) client-side assembly.OLC 316 also can be respectively sends information to the synchronous supplier 304C of POSA and the synchronous supplier 304D of client computer, as arrow 328A and 328B indicated.For example, OLC 316 can be by the data-pushing relevant with the licence of client computes equipment 308 to the synchronous supplier 304D of client computer.
In each embodiment, OLC 316 also communicates with identity platform 330.Identity platform 330 can comprise the information relevant with user's identity, such as user's Office market ID, i.e. Live ID.This type of information can be used to activate Office 326 on client computes equipment 308.
OLC 316 can identify user or whether client computer uses Live ID or BPOS ID to activate Office326.This can enable the use of context-specific user interface.For example, Live ID UI can be different from BPOSUI.In addition, which UI OLC 316 may show according to download location or for the next true directional user of CD that Office 326 is installed.
OLS 302 can comprise product key cache service 332 and product key high-speed cache 334.Product key high-speed cache 334 can be the high-speed cache of the regular replenishment of the product key that uses of OLS 302.Product key cache service 332 can be configured to retrieve product key from product key stored data base 336, as indicated in arrow 338.
OLS 302 also can comprise that cancelling supply serves 340.Cancelling supply service 340 can be via checking the asynchronous service of the product key of having cancelled supply with activating communicating by letter of verification system (AVS) 342 in OLS, as indicated in arrow 344.Cancel the licence that supply service 340 also can periodically be stopped using and be associated with the product key of cancelling supply via AVS 342.
Licensing system 300 also can comprise fraud detection system 346.Fraud detection system can comprise fraud detection service 348 and fraud detection database 350.Fraud detection service 348 can regularly be synchronized to fraud detection database 350 by the related data of the license storage 352 from OLS 302.Fraud detection service 348 can be obtained data from license storage 352 via the data access layer of OLS 302 354, as indicated in arrow 356.Fraud detection service 348 can be analyzed data dividually with OLS 302 subsequently, reduces thus the load on OLS 302.In each embodiment, with OLS 302 realize dividually fraud detection system 346 also allow fraud detection system 346 assembly upgrading and without change OLS 302.
the use of the licensed service of Office
It is described herein for Office or more specifically for some exemplary embodiments of the use of the licensed service (or OLS) of Office 2013 (being also referred to as Office 15) that this part provides.In Office 2013, OLS can support various licensing model, subscribes to (wherein online and Microsoft 365 of term " BPOS " and Microsoft is used interchangeably) such as the online external member of business yield-power (BPOS), and consumer's subscription.OLS also can support classical permanent license, license on probation and without key (that is, based on voucher) license, and conversion between various model.In addition, OLS can support the model that these are different in the context of different delivering methods, such as original equipment manufacturer (OEM) prestrain, CD and electronic software distribution (ESD).
The various permissions module that supported by OLS are each key service priority of Office 2013.The individual system that can process all these various models can reduce expense and the complicacy of Office 2013.
bPOS scene
BPOS scene is that this type of scene of scene that focuses on business is usually directed to keeper (admin), and the licence of gained conventionally with tissue but not final user be associated.Therefore, keeper can take licence away from a user, and is distributed to this in-house another user.In addition, BPOS scene can only comprise subscription.
It is below the explanation for the subscribing purchasing of BPOS scene and some exemplary embodiments of supply.According to this type of embodiment, the owner of company subscribes to as a part of BPOS for the Office that its employee buys BPOS and has eight user licenses.Infotech (IT) keeper of company is the account that each establishment in eight employees comprises BPOS voucher.IT keeper is the user license of each the supply Office in these employees subsequently.
there is the user of individual machine
Employee receives Email from IT keeper, notifies that now she can use Office 2013 to her.Email has the link to Office.com, and this link provides about can be for the information of her products & services.This employee clicks Email Links, is required to login with her BPOS voucher, and checks that link is to start Office 203.This employee's clickthrough, and Office 2013 OnNows.In the time that Office2013 starts, this employee is required to verify that her voucher is to activate Office 2013.
there is the user of multiple machines
In the time that this user accesses Office.com, she knows that subscribe to allowance installs Office 2013 at most on two machines.Therefore, this employee logins Office.com from second machine, and uses same process on second machine, install and start Office.
Although this employee knows that she is only awarded the qualification that uses Office on two machines, she determines to look at, if she attempts installing and move Office on the 3rd machine, what to occur.This employee follows same process and Office starts.But, this time, Office notify this employee she on other two machines, used her licence.Present her by the list of machine mounted thereto Office to this employee, and the licence that removes her to this employee prompting from one of other machines is to continue.The machine that replaces selection to remove from list, she determines to cancel.This employee may still can use Office to install in a few days on the 3rd machine, because subscription license can allow the grace period.If this employee has selected to remove from one of existing two machines her licence, the licence on this machine will be removed, and she can activate her licence on the 3rd machine.
cancel user is supplied
After some months, this employee has a holiday temporarily.The owner determines to employ provisional contract work to fill a vacancy in the time that this employee has a holiday.On contracted worker's first working day, inactive this employee's of the IT keeper of company BPOS account, is contracted worker's create account user, and supplies Office to contracted worker.
On contracted worker's first working day, to this employee's of contracted worker computing machine and for he create account.In the time starting Office, the current Office licence that contracted worker is apprised of on his machine lost efficacy, and he can provide another account to continue to use Office.Contracted worker inputs his account information, and can normally use Office.If his account is not provided to contracted worker, so still can there is the grace period, during this grace period, he can continue to use Office.
subscribe to renewal
After having spent nearly 1 year, the owner of company receives renewal notice Email.The owner determines subscription to extend 1 year.The owner accesses Office.com to renew this subscription.Meanwhile, these employees can experience unbroken Office use.
large enterprise's scene
Large enterprise's scene is identical with BPOS scene in fact.But large enterprise's scene can comprise the alliance's setting that allows user to activate Office with its territory voucher (even likely using noiseless mandate login its territory in the situation that they are current).
It is below the explanation for the subscribing purchasing of large enterprise's scene and some exemplary embodiments of supply.According to this type of embodiment, the Merchandising Manager of company often goes on business for work.Sometimes his computing machine with him not, but use the thing that can borrow from his supplier.The IT keeper of Ta Shi company has supplied one of these employees of Office to it.
office application is roamed into unknown machine by user
In the time that Merchandising Manager goes on a journey another company, he leaves behind his laptop computer.But he expects to access his the just electrical form to its operation.Fortunately, he remembers that the Office subscription of company allows him at any time from accessing Anywhere Office.Merchandising Manager borrows laptop computer from the IT keeper of other companies, and login Office.com.By Office.com, Merchandising Manager can start Excel for Interim use, and can retrieve this electrical form.In the time that this day finishes, this laptop computer is returned to this other companies by Merchandising Manager.
In the time receiving this laptop computer, the IT keeper of these other companies finds on this laptop computer, there is no Merchandising Manager's electrical form or the trace of Office amazedly.This is owing to the following fact: the number of times that Office can open every day is monitored and is limited to prevent swindle.
In the time starting Excel, point out input his voucher to Merchandising Manager, or they can be remembered by Office.com.Office.com can know whether Merchandising Manager has Office on the machine of his current use.BPOS website can be that Merchandising Manager provides supply particular machine or the option of Interim use Office on machine.In some cases, Office can be retained on machine.But, in the time that the IT of these other companies keeper guides Office, before allowing to use Office, point out input document to him.
from the subscription upgrading of Office 2010 to Office 2013
Company has been used BPOS Office 2010 (or Office 14) to subscribe to several years, and the owner feels quite pleased it.Other day, the owner receives Email, reminds he and IT keeper: as a part for the subscription of company, Office 2013 can be for upgrading.The owner is also apprised of he current Office 2010 and installs and will work on, but only continues 1 year again.
IT keeper enters BPOS keeper website, and the employee of company is upgraded to Office 2013.Each employee receives the Email with the instruction of download Office 2013 subsequently.
Merchandising Manager receives this Email and clicks the link to Office.com from this email.He is required to login with its BPOS voucher, and sees the link for starting Office 15.His clickthrough, and Office OnNow.In the time that Office starts, he is required to verify its voucher to activate Office.On the other hand, the accounting of company has been ignored this Email and has been continued to use Office 2010.After 1 year, the Office 2010 that accounting is installed quits work, and the Office 2013 that Merchandising Manager installs works on.
office market (OMEX) scene
OMEX scene focuses on final user.According to these scenes, final user buys Office via Office.com or via the backstage of Office 2013.This type of scene can comprise permanent and subscription license.Permitted user interface (UI) can determine that user is associated with BPOS scene or with OMEX scene, and can show suitable UI.
user upgrades from traditional version of Office by Office.com
It is below the example of the scene that wherein user upgrades from traditional version (, existing version) of Office by Office.com.User has used Office 2010 families and school edition on its computing machine, and wants now to buy latest edition.User enters Office.com, and is proposed a selection.User determines to buy and subscribes to.After creating Live ID and paying subscription, user starts Office 2013.On screen, there is warning, on his machine, have older Office copy with reminding user.After user confirms that he wishes to continue, Office 2010 unloads safely, and redaction starts.User is prompted input and buys with it voucher of subscribing to.User inputs its voucher and can normally use Office.
In certain embodiments, Office 2013 presents the option of download/installation Office 2013 or startup Office 2013 to user.Voucher can be remembered and automatically from the Internet-delivered to Office 2013, to make not force to user the prompting of input document.For example, in the protected situation in download website, actual product key can be inserted to filename.But, even if can being passed, voucher still force user to login to verify that its voucher may be desirable.In some cases, can suppose that the user who buys from Office.com has Live ID.Product key can back up on traditional copy of user Office.
user buys Office subscription license by Office.com
This scene is identical with the scene that wherein user upgrades from traditional version of Office by Office.com, except there not being the warning relevant with traditional version of Office, because there is not traditional version on machine.In each embodiment, after initial activation particular machine, do not require that user inputs its voucher.On the contrary, follow-up activation can complete by MachineKey (machine key).
user buys Office permanent license by Office.com
This scene is identical with the scene that wherein user upgrades from traditional version of Office by Office.com, except there not being the warning relevant with traditional version of Office, because there is not traditional version on machine.Depend on particular instance, user may maybe may not check product key.Can allow user to activate permanent license by its log-on message.Depend on this particular instance, transmit scene and can process by multitude of different ways.For example, if user wants his Office to be sold to another user, he may must give his voucher this new user, or gives and can be supported.
when user on the first computing machine, have Office subscribe to time, user by Office.com from second
the Office that calculation machine upgrades on the first computing machine subscribes to
According to this scene, user buys Office 2013 families and school edition is subscribed to and is arranged on his desktop computer and his laptop computer.User determines to be upgraded to Office 2013 professional versions.From this desktop computer, user enters Office.com, and upgrading is subscribed to.In Office.com, listed the computing machine that current Office 2013 families at him and school edition are subscribed to, and user is apprised of those computing machines in the situation that computing machine has the Internet and accesses and will be automatically updated to Office 2013 professional versions when user starts Office on those computing machines.Also give user's link for the desktop computer of upgrading now.User clicks immediately this link and his voucher is provided.Office is upgraded to Office 2013 professional versions subsequently on desktop computer.
After several days, user starts Word on his desktop computer.In the time that Word starts, user is apprised of license variation occurs, and gives the option that user is upgraded to now Office 2013 professional versions, upgrades after a while, maybe this machine is removed from subscribe to.User determines upgrading after a while.After one day, user starts Word again, and is given same options.User determines in this moment upgrading.
In each embodiment, in the situation that user just uses Office.com on desktop computer, user can upgrade desktop computer via Office.com.In some cases, also can allow user to select " upgrading after a while " option.In other cases, can force immediately upgrading.If allow " upgrading after a while ", can allow user to select this option specific times before forcing upgrading.Can point out user to input voucher or the removing action to present renewal.
when user on the first computing machine, do not have Office subscribe to time, user by Office.com from second
the Office that computing machine upgrades on the first computing machine subscribes to
According to this scene, user buys Office 2013 families and school edition is subscribed to and is arranged on his desktop computer.User buys old laptop computer from friend.His friend's Office 2013 professional versions are subscribed to and are moved on this old laptop computer.User can normally use Office on this old laptop computer.User's friend remembers that he forgets the Office 2013 professional versions subscription that remove him from this laptop computer, and therefore he enters Office.com and from his subscription, removes this laptop computer.
In the time that start Office next time, the current Office licence that user is apprised of on his machine is removed, and he can provide another account to continue to use Office.User can input his voucher subsequently, so that the Office version that uses the subscription that is subject to him to support.
in the time that user has Office subscription on the first computing machine, user uses Office.com from second
calculation machine is updated to permanent license by the Office licence on the first computing machine from subscription license
This scene is with wherein when user has user while subscribing on the first computing machine, to upgrade from second computer the scene that Office that he uses at the first computing machine subscribes to by Office.com identical.But, replacing and be upgraded to another subscription license, user is upgraded to permanent license simply.
when user on the first computing machine, do not have Office subscribe to time, user by Office.com from second
computing machine is updated to permanent license by the Office licence on the first computing machine from subscription license
This scene is with wherein when user does not have user while subscribing on the first computing machine, to upgrade from second computer the scene that Office that he uses at the first computing machine subscribes to by Office.com identical.But, replacing and be upgraded to another subscription, customer upgrade is to permanent license.
in the time that user has permanent license on the first computing machine, user by Office.com from second
calculation machine is subscribed to the Office on the first computing machine to change into subscription license from permanent license
User has Office family and school edition on the first computing machine.But user finds that he expects the more more options of Office product.User signs in to Office.com from second computer and subscribes to buy Office professional version.Buying while finishing, give user and link to download Office professional version and give user about the guide of Office version how to upgrade current installation.
User again signs in to Office.com on the first computing machine, and clicks download link.On the first computing machine, the copy of Office is updated to Office.com professional version.If user does not access Office.com again, he can carry out renewal by entering backstage on the Office family of his current installation and school edition.For example, user can come more new permit or inspection renewal by button click.
User cancels his subscription after a while.Professional version on the first computing machine is subscribed to ultimate failure and is returned to Office family and student's plate.
user through license is different from active user
The owner of small business has three employees.He wishes that his each employee uses Office.Consult subscription proposal on Office.com after, the owner recognizes that each subscription is included in the qualification that uses Office on two different machines.But the owner recognizes that he can only have a subscription a time.Therefore, he requires one of employee also to buy subscription, and he understands this subscription of separate payment subsequently.One of the owner and employee download to Office on its computing machine separately, and activate it with possessory voucher.Two other employee downloads to Office on its computing machine separately, and activates it with employee's voucher.For making Office personalization, these employees still can login and normally use it with its oneself ID.
In certain embodiments, can suppose that each user can only have an Office and subscribe to.But in some cases, user can have the subscription of Office family and school edition and the subscription of Office professional version.And user can have multiple versions of same subscription, or multiple permanent license.
user is converted to BPOS licence from subscription license
The owner of small business has three employees.One of user and employee have permission reaching the Office professional version subscription that Office is installed on two machines.Other two employees install Office with one of these subscription separately on its machine.
The owner is current has employed five new employees.Reading after online information, he determines that BPOS subscription will be applicable to his demand better.The owner enters Office.com and his subscription is converted to BPOS and subscribes to, and buys nine licences (enough for company everyone).
The owner creates BPOS account and gives this BPOS account of each employee, and supplies Office to each employee.In the time that each employee starts Office, it is no longer valid that he is apprised of current licence on his machine, and he can provide another account to continue to use Office.Therefore, each employee can input its BPOS ID, and normally uses subsequently Office.In addition, in certain embodiments, in the situation that employee does not provide another account immediately, can provide the grace period.
user is converted to BPOS licence from permanent license
The owner of small business has ten employees.The owner has bought the permanent license of Office family and enterprise version for each employee's machine.But, reading after online information, the owner determines to subscribe to and will be applicable to better his demand with the BPOS of Office specialty enhanced edition.The owner enters the BPOS that Office.com and purchase have 11 licences (enough for his company everyone) and subscribes to.The owner creates BPOS account and gives this BPOS account of each employee, and supplies Office to everyone.
Give each employee and download Office subscription from possessory guide to enter its BPOS homepage.Or, also give employee about the guide that how to change its licence from backstage.If employee does not take action on their current machine, even if they login with its BPOS ID, their machine will continue to move current any permanent license on their machine.
user cancels subscriptions by backstage
User has basic Office subscription package, but expects the more more options of Office product.User enters backstage and selection " my account ".User selects " managing my subscription ", and his bag is upgraded to that subscription of the product that comprises his expectation.In the time that he no longer expects addition product, user enters " my account " under backstage and cancels his subscription.User's Office copy turns back to reduction functional mode, or any license that he has before he upgrades its bag.
user cancels subscriptions by Office.com
User has basic Office subscription package, but expects the more more options of Office product.User signs in to Office.com to manage his current subscription.User is upgraded to his bag the subscription of the product that comprises his expectation.In the time that user no longer expects the product of increase, he signs in to Office.com and cancels his subscription.His Office copy turns back to the reduction functional mode that supported by his previous licence.
user buys permanent license and subscription license
User has Office Starter on his laptop computer.User logins Office market with his Live ID, and uses his laptop computer to buy Office via backstage.Office Starter is upgraded to subscription package.
Afterwards, user turns back to Office market via web browser to buy permanent license.User is without re-entering his payment details.On the contrary, his voucher is remembered in Office market.After user confirms to buy, he downloads Office and on laptop computer, starts Office.
He buys Office some months afterwards, and user catches virus on his laptop computer, and his application will be reset.User sign in to Office market in case again download he Office copy and his licence this can realize with identical product key.
subscribe to renewal
Subscribe to if user has Office, he can renew this subscription automatically.User can experience unbroken Office and use.
subscribe to and lost efficacy
User has Office and subscribes to.But he does not mind this service and determines to allow in the time that it is expired it lose efficacy.Accounting system sends many envelope Emails to user, and he has ignored these Emails.Run through this time, user continues to use Office.The subscription of notifying him by Office to him at certain some place has expired and he can be from his subscription of back-stage management.He ignores these warnings, and final Office decommissions on his computing machine.
subscription upgrading from Office 2013 to next Office version
The Office that user has Office 2013 subscribes to, and the current Office 2013 that installed on his computing machine.After several years, next Office version is issued.When user starts any Office application next time, he is notified, and he can be upgraded to new Office version.User also notified he can do like this from backstage at any time.User determines present upgrading.New Office version is installed on user's computing machine.
In certain embodiments, multiple assemblies can be to the new Office version of user notification out, such as OMEX or Office license client (OLC) or both.In some cases, the time quantum that is upgraded to next version that user is last can be tracked.In time that certain is a bit, can force upgrading, and legacy version can be changed into unavailable.Key can be from correct tax revenue place.Propose to use same logic for BPOS.
retail/OEM/CD scene
These scenes focus on traditional retail channel.Common theme in these scenes is that user starts with product key.In for example, box when, product key is usually included in user and buys Office.
user buys Office from retail shop
User enters retail shop, and buys the box-packed copy of Office family and school edition.In this box, there are CD and product key.User installs Office from CD.As a part for installation process, user is prompted to input his product key.User is also prompted to login Office, and after doing like this, user is given the chance that his licence is associated with his Live ID.After some months, user has found virus on his computing machine.User's reformatting computing machine and refitting Office.Unfortunately, user has lost product key.But user can only activate Office with his Live ID.OLS can return to the product key that Live ID is associated therewith.
there is the user of multiple machines
User has four computing machines in his premises.User has bought the copy of Office from retail shop, and can on the first computing machine, successfully activate with product key Office.Because he is associated licence with his Live ID in the time that his the first computing machine is set, so the Live ID that user also can use him activates Office second and the 3rd on computing machine.But when attempting activating the 4th computing machine, user receives error messages, notifies his licence only to support three computing machines to him.
user is associated Office licence with Live ID
Generally speaking,, if user expects his product key to be associated with his Live ID, he can be input to Office market online by complete 5x5 product key.Via Office market, OLS can be associated product key subsequently with user's Live ID.
User can check online by Office.com or by backstage the Office licence being associated with his Live ID.In addition, user can cancel product key and his Live ID associated by Office.com or by backstage.When the Live ID that attempts to reuse him as user activates, he cannot do like this.But, the computing machine running that will do as usual having activated with his Live ID.
scene on probation
These scenes are for trial license and identical with non-trial subscription scene in fact.But, for scene on probation, licence time period much shorter.
user starts trial license by Office.com
User is using Office Starter.User determines to attempt Office, and downloads trial license from Office.com after his Live ID is provided.Start Office on his machine when, user is prompted to input his Live ID.Once user inputs his Live ID, user just can bring into use Office.
user starts trial license with product key
User has obtained the copy on probation of Office.The copy on probation of Office comprises the product key being associated with trial license.User installation Office and activate Office with product key.
trial license lost efficacy
User is using Office Starter, and expects now to attempt Office.After his Live ID is provided, user downloads trial license from Office.com.Along with time lapse, notify user his on probation expiring very soon from OLC.User determines to allow his trial license lose efficacy.In the time that his trial license is expired, Office is returned to Office Starter.
user is converted to subscription license from trial license
Dan is trying out at the Office that uses him to download from Office.com.Along with time lapse, notify his on probation will expire very soon from Office client to him.Dan uses Office 14 to have good experience and determines and is converted to completely and subscribes to via Office.com (or backstage).His Office copy auto-update is served and is not interrupted to subscribing to completely.If he has activated on probation via product key and ID is never provided, he may need to provide his ID to subscribe to be converted to completely so.
for buying, activate or reactivate each method of licence
Fig. 4 is the process flow diagram flow chart of the method 400 of the licence for buy application by market service.In each embodiment, market service is that (OMEX) experienced in Office market.In addition, in certain embodiments, method 400 realizes via the above licensing system 300 with reference to figure 3A, 3B and 3C discussion.
Method 400 starts at frame 402, and wherein user starts the purchase of licence.User can start purchase by for example backstage or the Office.com of Office Starter, Office Trial (trying out), Office.At frame 404, user selects the storage holding unit (SKU) relevant with required licence.At frame 406, user uses his Live ID to sign in to Office market (for example, OMEX).
At frame 408, determine whether user is buying subscription SKU.If user, buying subscription SKU, can not select the means of payment and complete payment at frame 412 frame 410 users.Upgrade to OLS notice licence via the synchronous supplier of OMEX at frame 414 subsequently.
Subscribe to SKU if user is buying, subscribing to SKU at frame 416 can be set up.User can select the means of payment and complete payment at frame 420 at frame 418 subsequently.At frame 422, subscription specifics can be recorded.For example, SKU, automatically Renewal information and/or book keeping operation interval information can be recorded.Upgrade to OLS notice licence via the synchronous supplier of OMEX at frame 414 subsequently.
Fig. 5 is the process flow diagram flow chart of the method 500 of the licence for applying by market service initial activation.In each embodiment, market service is OMEX.It is upper that the initial activation of licence can occur in a client devices (a for example computing machine), and can not comprise upwards sale (upselling).In certain embodiments, method 500 realizes via the above licensing system 300 with reference to figure 3A, 3B and 3C discussion.
Method 500 starts at frame 502, and wherein parameter (such as authorizing warrant) is passed to guide by OMEX.At frame 504, user starts and downloads from Office.com.At frame 506, retrieve each bit from content delivery network (CDN), and at frame 508, in the time of these bits of retrieval, show start picture.
At frame 510, OLC is to license storage resource request open general licence-a type of import licence.This allows Interim use Office in the time that licence is activated.At frame 512, Office loads, and at frame 514, OLC use authority warrant is to the OLS card that asks for permission.At frame 516, OLS returns to shielded mandate (or without key authorization) and product key (in the situation that of non-roaming application scenarios).
At frame 518, OLC determines whether product key and OSPP can use.If product key and OSPP can use, at frame 520, obtain OSPP licence with product key.At frame 522, the unique ID of the pass (PUID) and user's user name is stored on local machine.
If product key and OSPP are unavailable, the use of Office can be via enabling without key authorization.OLC can periodically determine whether product key and OSPP can use at frame 518 subsequently, and can in the situation that product key and OSPP become available, take suitable action.
Fig. 6 is the process flow diagram flow chart of the method 600 of the licence for reactivating application.This type of method reactivating can comprise upwards sells.In certain embodiments, method 600 realizes via the above licensing system 300 with reference to figure 3A, 3B and 3C discussion.
Method 600 starts at frame 602, and wherein Office is loaded, or the licence inspection being scheduled.At frame 604, the licence of determining Office is subscription license or trial license.If licence is not subscription license or trial license, it is confirmed as permanent license.In this case, method 600 continues at frame 606, and wherein user normally uses Office.In some cases, license expiration or for some reason and stop in the situation that, Office can decommission.
If licence is subscription license or trial license,, at frame 608, OLC sends license information to OLS, and at frame 610, OLS returns to licence to OLC and upgrades.At frame 612, determine whether licence is updated.If licence is updated, OLC upgrades Office with new licence.In some cases, can to user present user wish to realize now new permit or after realize the option of new permit via UI.In addition, if new permit relates to the change of Office version, redaction can be downloaded.Or if licence is not updated, method 600 can turn back to frame 606.In this case, licence may expire, and therefore Office can decommission.
office licensed service (OLS)
This part has been described the running of the OLS of licensing system described herein, such as the OLS 302 of the above licensing system 300 with reference to figure 3A, 3B and 3C description.OLS takes on the central hub of licensing system.From each source, (such as BPOS or OMEX) obtains supply data to OLS, and for example, what user bought.OLS also obtains product key, provides without key authorization, and leading subscriber-machine relation, for example, user has activated how many machines.
OLS can allow licensing system to process the licence for various dissimilar operating system or equipment.This can cause the expense of approved applications to reduce.The OLS also variation of available service model provides agility and dirigibility, and the centralized view of user-license information is provided.
In each embodiment, OMEX is the interface that OLC is provided for coming for user identity handle machine.OMEX is also the interface that website (for example, OMEX managing web) is provided for coming for user identity handle machine.OMEX can safeguard ID, the licence relevant with ID, with and the database of the machine that used of licence.In addition, OMEX can provide the ability of obtaining license key from key storage.In addition, OMEX can provide OLC to can be used to the interface of authorizing Office to use, or via product key distribution (for the situation that wherein OSPP can use) or via the model based on direct mandate (for the disabled situation of OSPP wherein, that is, without key authorization scene).
OLS provides the service of at least three wide in range classes, comprises that user permits supply, product key and roaming mandate retrieval and machine handing ability, as explained further below.Permit supply about user, the information providing based on partner (such as BPOS and OMEX), the information that OLS can store and retrieval is relevant with the type of the qualified Office licence of enjoying of user.For example, OLS can store and whether retrieval has bought the relevant information of permanent Office professional version with the current Office family and enterprise version or he of whether having subscribed to of user.
Authorize retrieval about product key and roaming, OLS has the ability from key storage, to retrieve correct product key based on the qualified Office licence of enjoying of user.This ability is seamless for user and partner.In other words, product key is retrieved as required in the time that user attempts activating machine, and activates and automatically completed by OLC, and without show actual product key to user.But OLS does not comprise that partner at random retrieves the ability of product key.In addition, also have the ability retrieval roaming of OLS is authorized, and without key authorization, it makes user in roaming application scenarios, use Office and without product key.
In certain embodiments, OLS provides the only machine handing ability for subscription license.Except retrieving simply product key, OLS also can manage the machine quantity having activated, and provides the mode of the machine rotation in the subscription that makes to be included in him for user.For example, if the subscription that user buys makes that he is qualified uses Office on three machines, OLS can cancel the supply to one of first three machine in the situation that of the 4th machine of supply.
The database of OLS can be organized by the user that can have one or more qualification and can have zero or multiple machines under each qualification.Each qualification is all proposed and is only associated with a proposal with one.For the permanent qualification with permanent proposal, single permanent key can be associated with each qualification.
Fig. 7 be illustrate permitted to user 704 for multiple qualifications of multiple different machines 706A-F or the block diagram of licence 702A-E.Each qualification 702A-E can comprise with permanent qualification or subscribe to any one or both the relevant proposal 708A-D in qualification, as discussed further below.
In each embodiment, OLS only manages and uses the machine (for example, machine 706A, 706B, 706C, 706D and 706F) of subscribing to qualification (for example, qualification 702A, 702B and 702E) supply.Therefore, the user for example, with permanent qualification (, qualification 702C and 702D) can not make any machine be associated with these qualifications, for example, unless machine (, machine 706E) was previously converted according to subscribing to qualification.
In each embodiment, propose representation case as or OMEX online by Microsoft can be for the right to use of a type of purchase.Propose be not because of user different but when licensing system is reached the standard grade and be updated filling.Can be included into the interpolation of proposing and renewal, as a part of disposing.Each proposal can be associated with proposal ID, and this proposal ID is unique ID of this proposal of mark.In addition, each proposal can be associated with the proposal of particular type.For example, proposal can be that net product key is proposed (, with proposal permanent or that trial license is relevant), or machine handing is proposed (, the proposal relevant with subscription license).
According to embodiment described herein, licence or qualification are one group of specific rights to use.User can have one or more qualification.These qualifications can be filled by synchronous supplier during supplying.Each qualification has unique qualification ID, and it can partly be determined by supply partner.
The various information relevant with each qualification can be recorded together with this qualification.For example, the state of partner, user ID, proposal ID and the qualification of qualification ID, partner's qualification ID, correspondence can be recorded.For example, the value of the parameters relevant with qualification can be recorded.For example, whether allow to roam the relevant information of application scenarios (with qualification, RoamingType (roaming type)), the information (, BillingCountryISO (keep accounts national ISO)) relevant with user's book keeping operation country and the information relevant with the language of qualification can be recorded.In addition, with allow about qualification supply or information that the maximum quantity of machine to be converted is relevant (, ActiveMachineMax (movable machine maximal value)), can be recorded about qualification is supplied or the quantity of machine to be converted is relevant information (, ActiveMachineCount (movable machine counting)) and various other information with current.The parameter relevant with the token of qualification also can be recorded.This type of parameter comprises SecureToken (security token), TokenUseMax (token use maximal value), TokenUseCount (token usage count), TokenExpiryLength (token expire length) and TokenExpiry (token expires) etc.
Machine can be the specific installation that uses the Office of particular subscription qualification.Under this qualification, can there is zero or multiple machine.While providing new subscription (or TBL) product key from qualification, create new engine at every turn.
Each machine can be associated with the MachineKey (machine key) that can be used to identify this machine.The value of machine key can derive from providing to the product key of machine.The state of machine (such as machine whether supply, to be converted, change or supply in advance) can be recorded.In addition, machine dependent various other parameters can be recorded, and comprise qualification ID, propose ID, key state and the information relevant with machine itself.
According to embodiment described herein, for product key (, ProductKey) is provided in each qualification.Under each qualification, may only there is a product key of enabling, and only have permanent qualification can there is the product key of enabling.Product key can be created when first to permanent qualification request product key.As long as qualification unconverted, just should all derive subsequent keys requests be used same permanent key.The information (, KeyStatus (key state)) relevant with the state of product key can be recorded.The state of product key can be to enable, wait to forbid or forbid.The relevant information of the number of times that is issued with product key (, KeysIssuedCount (key providing counting)) and information (, KeyStatusLastUpdate (key state final updating)) the relevant information relevant with the KeyStatus final updating date can be recorded together with this product key.
In each embodiment, supply API is one group of inner API for supplying.Supply API is only called by synchronous supplier.Each synchronous supplier API can call one or more in API of supply.Supply API can be designed to all the other licensing systems to show as atomic operation.Note, single supply action can adopt multiple supply API Calls.For example, for the synchronous supplier's of OMEX ProvisionUser () API, AddUser () and CreateEntitlement () call and are used.The CreateEntitlementForUser () failure if AddUser () is successful, user may not qualify, and user is by the unwarranted access not being awarded Office.Some examples of each API in licensing system comprise: the AddUser () API by user add to OLS, for user creates the CreateEntitlement () of qualification, and qualification is converted to the ConvertEntitlement () API of another proposal or undated parameter ActiveMachineMax.No matter this conversion be for example from subscription license to another subscription license or from subscription license to permanent license, ConvertEntitlement () API is similarly running.In addition, unless explicitly stated otherwise, swindle counter and be limited in the transition period and can not be reset.
Fig. 8 is the process flow diagram flow chart of the method 800 for qualification being converted to another proposal or the renewal proposal relevant with this qualification.The renewal of this proposal can comprise for example upgrades ActiveMachineMax.The method starts at frame 802, and wherein ConvertEntitlement () API is called.At frame 804, can determine whether to cancel confession should qualification.If cancelled for should qualification, at frame 806, method 800 finishes.If do not cancelled for should qualification, method 800 proceeds to frame 808, wherein determines that whether existing proposal is identical with new proposal.
If existing proposal is not identical with new proposal, determine whether to exist the existing machine of supplying for this qualification at frame 810.If there is the machine of existing supply, at frame 812, the machine of all existing supplies is updated to state=to be converted.Method 800 advances to frame 814 subsequently, and wherein this qualification is updated to new proposal.At frame 810, if determine the machine that does not have existing supply, method 800 advances to frame 814 automatically.
At frame 816, determine whether existing ActiveMachineMax=MaxMachines.In addition,, at frame 808, if determine existing proposal and newly provide identical, method 800 can advance to frame 816 automatically.
At frame 816, if existing ActiveMachineMax ≠ MaxMachines, at frame 818, ActiveMachineMax can be updated to MaxMachines.Can determine at frame 820 whether ActiveMachineCount is greater than ActiveMachineMax subsequently.If ActiveMachineCount is greater than ActiveMachineMax, before advancing to frame 824, method 800 records this event at frame 822.Otherwise method 800 advances to frame 824 from frame 820.In addition,, at frame 816, if existing ActiveMachineMax=MaxMachines, method 800 advances to frame 824 automatically.
At frame 824, determine whether to exist the existing PerpetualKey (permanent key) that enabled.If there is no the existing PerpetualKey that enabled, method 800 finishes at frame 826.If there is the existing PerpetualKey that enabled, in method 800 before frame 826 finishes, at frame 828, PerpetualKey is set and makes PerpetualKey=wait to forbid.
Multiple additional API also can be included in licensing system.For example, UpdateEntitlementStatus () API can be used to upgrade the state of qualification.The bill information that UpdateBillingCountry () API can be used to upgrade user (, BillingCountryISO), and GetDownloadInfo () API can be used to return download URL and other information relevant with this qualification.
In each embodiment, security token (, SecureToken) is only OLS Globally Unique Identifier (GUID) that generate, that authorize the temporary visit to user's qualification.When client computer is made OLS while calling with SecureToken, client computer is in fact to use the voucher that it is provided to the user of token to call OLS.Identity warrant is provided and provides the Main Differences of security token to be that the action scope of security token is specific qualification, so it can only be used for retrieving information or obtain the key of specific qualification, and security token has limited use and event horizon.
CheckMachineStatus () API returns to the state of machine.But this API can only return in the information of subscribing to the machine of supplying under qualification.GetEntitlementsForIdentity () API can be provided by the qualification that current and provided identity is associated.GetEntitlementForMachineKey () API can return to the current qualification being associated with MachineKey.In certain embodiments, this process flow can be as follows: (1) retrieves the EntitlementID (qualification ID) of machine with the MachineKey of coupling; (2) retrieve this qualification with above EntitlementID, and (3) return to the information about this qualification.
In addition, GetKey () API can be that OLC can therefrom retrieve without key authorization and/or product key for the API activating.Logic for this API can be split into multiple parts.
Fig. 9 be for the identity of authentication of users and to its supply the process flow diagram flow chart without the method 900 of the identity of the qualification of key authorization.Method 900 starts at frame 902, and wherein GetKey () API is called.At frame 904, determine whether to have used SecuredToken.If used SecuredToken, confirm OLS at frame 906.At frame 908, determine that whether token is invalid.If token is invalid, returns and make mistakes at frame 910.If token is effective, determine TokenUseCount at frame 912.Retrieve at frame 914 user who is associated with token subsequently.The method advances to frame 916 subsequently.
In addition, at frame 904, do not use SecuredToken if definite, method 900 advances to frame 918, and wherein identity warrant is identified.Continue in frame 916 the method subsequently, wherein determine whether user is suspended.If user is suspended, returns and make mistakes at frame 920.Otherwise, determine at frame 922 whether EntitlementID exists.If EntitlementID does not exist, return and make mistakes at frame 924.Otherwise, determine at frame 926 whether qualification is suspended or cancels supply.If qualification has been suspended or has cancelled supply, return and make mistakes at frame 928.Otherwise, method 900 proceed to below with reference to Figure 10 discuss without key authorization flow process.
Figure 10 is for supplying in due course the process flow diagram flow chart without the method 100 of key authorization.Can be to make client computer can move Office without the object of key authorization temporarily, and also activate without use product key without OSPP.This may be useful at the run duration for the first time of for example installing or during roaming application scenarios.
Can be the string that has symbol without key authorization, this has the string of symbol to comprise by client computer to be used for enabling interim Office access and to be stored in the mandate string in Offer (proposal) as BaseAuthString (the basic string of authorizing).Also can comprise multiple parameters without key authorization, comprise and answer GetKey () to ask the HWID parameter being sent by client computer, and represent that client computer can not re-use TimeValidEnd (the time effectively finishes) parameter without the date and time of key authorization.
Starting at frame 1002 without key authorization flow process of method 1000.In each embodiment, method 1000 is carried out after method 900 as discussed above.Method 1000 can be included in frame 1004-1022 and make and multiplely determining, for example, comprises relevant the determining of the type of the key of asking with client computer.At frame 1012 or 1014, if do not meet the condition of method 1000, can return and make mistakes at frame 1024 or 1026.
If met the condition presenting in method 1000, can determine that at frame 1028 whether product key is requested.If product key is not requested, return without key authorization at frame 1030.If product key is requested, can determine at frame 1032 qualification proposes whether allow installation, that is, not only roaming.If qualification is proposed not allow to install, return and make mistakes at frame 1034.Otherwise, determine and propose whether type is KeyOnly (only key) at frame 1036.
If propose that type is not KeyOnly, method 1000 advances to the subscription flow process of Figure 11 A or 11B, as shown in frame 1038.If propose that type is KeyOnly, method 1000 advances to the product key flow process of Figure 12 A or 12B, as shown in frame 1040.
Figure 11 A is the process flow diagram flow chart of the method 1100 for retrieving existing subscription (or TBL) key.In each embodiment, the MachineKey using in GetKey () API Calls and HWID with in OLS, store those identical, existing key is retrieved.The subscription flow process of method 1100 starts at frame 1102.In each embodiment, method 1100 is carried out after method 1000 as discussed above.Method 1100 can be included in frame 1104-1140 and make and multiplely determine and carry out multiple steps.In certain embodiments, method 1100 advances to the new subscription flow process of Figure 11 B, as shown in frame 1142.In other embodiments, in the time that finishing, method 1100 returns to existing subscription, as shown in frame 1144.
Figure 11 B is the process flow diagram flow chart of the method 1146 for obtaining new subscription.In each embodiment, in following situation from key storage retrieving novel key: there is new installation, machine and used up and fault-tolerantly reactivate, occurred qualification conversion or again supplied machine.Method 1146 can be carried out after method 1000 or method 1100 as discussed above.
The new subscription flow process of method 1146 starts at frame 1148.After frame 1150-1156 carries out multiple steps, return to new subscription at frame 1158.Or, if do not meet the condition of method 1146 at frame 1150, return and make mistakes at frame 1160, and do not obtain new subscription.
Figure 12 A is the process flow diagram flow chart of the method 1200 for retrieving existing product key.Method 1200 can be applicable to KeyOnly and proposes type.In each embodiment, method 1200 is carried out after method 1000 as discussed above.The product key flow process of method 1200 starts at frame 1202.Method 1200 can be included in frame 1204-1212 and make and multiplely determine and carry out multiple steps.In certain embodiments, at frame 1206, if do not meet the condition of method 1200, return and make mistakes at frame 1214.In other embodiments, method 1200 advances to the new product key flow process of Figure 12 B, as shown in frame 1216.In addition, in other embodiments, in the time that finishing, method 1200 returns to existing product key, as shown in frame 1216.
Figure 12 B is the process flow diagram flow chart of the method 1218 for obtaining new product key.Only, in the time that qualification is new or has changed from previous qualification, just can obtain new product key.Method 1218 can be carried out after method 1000 or method 1200 as discussed above.The new product key flow process of method 1218 starts at frame 1220.Method 1218 can be included in frame 1222-1226 and make and multiplely determine and carry out multiple steps.In the time that finishing, method 1218 returns to subsequently new product key, as shown in frame 1228.
Figure 13 is the process flow diagram flow chart of the method 1300 for retrieve each machine according to qualification.Method 1300 can be used GetMachineList () API to carry out.GetMachineList () API can return to user and asked the machine of its key.Caller can be asked the machine being associated with specific qualification or be had the machine of particular state.
Method 1300 can start at frame 1302, and wherein GetMachineList () API is called.Method 1300 can be included in frame 1304-1316 and make and multiplely determine and carry out multiple steps.Retrieve machine at frame 1318 according to qualification subsequently, and return to the list of machine at frame 1320.
In each embodiment, if the requested trial of API is carried out GetMachineList () according to current qualification on permanent proposal, API will attempt retrieving machine according to this qualification because this qualification be from subscribe to propose conversion and really to have the current machine that is using subscription be possible.
Figure 14 is the process flow diagram flow chart of the method 1400 for cancel supply particular machine according to qualification.Method 1400 can be used RemoveMachine () API to carry out.RemoveMachine () API can be used to mark for the machine of cancelling supply.This cancellation supply can be carried out subsequently asynchronously.
Method 1400 starts at frame 1402, and wherein RemoveMachineList () API is called.Method 1400 can be included in frame 1404-1418 and make and multiplely determine and carry out multiple steps.In certain embodiments, at frame 1408,1416 or 1418, if do not meet one of these conditions of method 1400, can return and make mistakes at frame 1420,1422 or 1424 respectively.Otherwise, be configured to cancel supply in frame 1426 machine states.This removes machine effectively from qualification.
In each embodiment, GetUrlForEntitlement () API returns to download URL to download these bits of qualification.This API is similar to supply GetDownloadInfo () API and works.But the identity using can be warrant or the OLS SecureToken that BPOS or Live provide, instead of PUID.Be OLS SecureToken in used identity, SecureToken can not regenerated.On the contrary, existing token can be used in URL.This API can only return to URL, instead of each download parameters.
According to each embodiment described herein, product key high-speed cache is that OLS is from wherein obtaining the key storage of key.Product key high-speed cache is the database that is independent of OLS core permission database, and fills by asynchronous procedure, and this asynchronous procedure is as long as the available key quantity in this high-speed cache drops on the following just retrieval key from JIT system of specific threshold.
Product key high-speed cache can be stored the metadata about each key, comprises the PKPN of key; The JIT SKU of PKPN, and initial from wherein obtaining the country of data center of key.Some parameters that product key high-speed cache can provide based on GetKey () logic are returned to tax revenue and are observed key, and parameter comprises as the qualification KeyStoreReqId of Offer attribute and the BillingCountryISO obtaining according to qualification.
In OLS, product key is cancelled provisioning component and can is and the asynchronous service of core system independent operating.Product key is cancelled provisioning component and can be moved by the regular timetable of being arranged at first once a day.
Cancel the run duration that is ranked of provisioning component at product key, it can tagged keys state (, KeyStatus) for waiting that the date of forbidding and last key state is upgraded (, KeyStatusLastUpdate) exceedes bimestrial machine.In addition, cancel the run duration that is ranked of provisioning component at product key, it can tagged keys state be to wait that the date of forbidding and last key state is upgraded exceedes the product key of month.In certain embodiments, can because of synchronous supplier upgrade or user action (such as, in response to user, machine is removed from qualification) and cancel the supply to this machine.
office experiences in market synchronous supplier
The synchronous supplier of OMEX can be used to receive supply from OMEX partner and upgrades and those renewals are published to OLS.More specifically, the synchronous supplier of OMEX does not allow OMEX partner directly to access the level of abstraction of the special accommodating layer in OLS for OMEX partner shows one group of API to carry out each supply task.
Figure 15 A is the process flow diagram flow chart that user initially buys the method 1500 of qualification.Method 1500 can be carried out with the synchronous supplier of OMEX discussed above.At frame 1502, user initiates to buy, and at frame 1504, user selects SKU via client computer or via Web by OMEX.At frame 1506, user uses his Live ID to login, and at frame 1508, user completes payment information to buy qualification.
At frame 1510, OMEX calls CTP and completes purchase action, and at frame 1512, calls the synchronous supplier of OMEX to supply to user, that is, and and ProvisionUser ().At frame 1514, the synchronous supplier of OMEX supplies to user, and returns to download URL.In OLS, can use ProvisionUser () API to realize to user's supply.ProvisionUser () API can only be called by OMEX partner.
In some cases, for synchronous supplier, there is call overtime.Therefore,, at frame 1516, can determine whether to have occurred to make mistakes or overtime.If occurred to make mistakes or overtime, can show to user " returning to download after a while " message at frame 1518.Otherwise at frame 1520, OMEX shows the download link of qualification to user.
Figure 15 is the process flow diagram flow chart of the method 1522 for upgrading qualification.Method 1522 starts at frame 1524, and wherein CTP starts supply readjustment.At frame 1526, OMEX license notification procedure calls the synchronous supplier of OMEX to use ProvisionUser () API to supply to user.At frame 1528, the synchronous supplier of OMEX supplies to user, or upgrades qualification.Subsequently, determine whether to have occurred to make mistakes or overtime at frame 1530.If occurred to make mistakes or overtime, method 1522 turns back to frame 1524.Otherwise method 1522 finishes at frame 1532.
Figure 16 is the process flow diagram flow chart for supply or user is transformed into from a qualification method 1600 of another qualification to user at OLS.The method starts at frame 1602, and wherein ProvisionUser () API is called.Determine whether to be provided with transition flag at frame 1604.
If be provided with transition flag, can determine at frame 1606 whether qualification has cancelled supply.If supply has been cancelled in qualification, at frame 1608 throw exceptions.Otherwise, at frame 1610, user is transformed into another qualification.Or, if transition flag is not set at frame 1604, at frame 1610, supply to user.
Subsequently, ask DownloadType (type of download) at frame 1612, and return to download URL at frame 1614.The download URL of returning can comprise and allows user to activate Office and for example, without again keying in his protected token (, GUID) of voucher.Therefore, the use of URL may be limited.In certain embodiments, GetDownloadInfoForEntitlement () API is used to regenerate in due course download link.
Figure 17 is for determining whether the process flow diagram flow chart of the method 1700 that will upgrade qualification according to ForcedUpdate (forcing to upgrade) process.Method 1700 can start at frame 1702, and wherein ProvisionUser () API is called.Method 1700 can be included in frame 1704-1726 and make and multiplely determine and carry out multiple steps.In certain embodiments, determine and do not have qualification at frame 1718, and at frame 1728 throw exceptions.Otherwise method 1700 proceeds to frame 1730, wherein download URL is returned.Download URL can depend on whether be provided with ForcedUpdate (as frame 1712 or frame 1722 determined) and whether allow qualification to upgrade (as determined in frame 1724) and change.
According to method 1700, ForcedUpdate can be designated during asynchronous CTP supply is called, because it can be to have bought and so on final authoritative institution about user.In race condition, difference may occur, during wherein asynchronous CTP supply is invoked at purchase, generation is before called in initiation supply.In some cases, if ForcedUpdate is designated during supplying, from last successfully renewal, in 10 seconds, can not allow another renewal of same EntitlementID, unless be provided with ForcedUpdate in new ProvisionUser () API Calls.In this case, based on existing membership information, calling will be successfully and by return message.Time value can be configurable, and can be isolated at synchronous supplier's layer for the logic of this inspection.
For not making the renewal of user's qualification but call in situation about successfully returning, response can comprise to caller indicates the mark of not making renewal.Response also can comprise existing membership information in system.Caller can competency for operation information carry out troubleshooting or take other additional move.
to the license of equipment
According to each embodiment described herein, OLS can be updated to support dissimilar equipment and the license with the application-specific of these dissimilar device-dependents.For example, OLS can support the license of moving the Office (for example, Office 2015) of the forms such as application and Mac Office application with MOX application, mobile Office application, Android application, Windows.Therefore, OLS can allow the license across the Office of many different platforms.
In OLS, term " computing machine " can refer to PC and Mac, and term " equipment " can refer to MOX (or flat-panel devices) and mobile phone.Jointly, computing machine and equipment both can be called as " machine " in OLS.
In OLS, the license of equipment can be taked the form of the licence based on voucher or the licence based on token.For the licence based on voucher, any equipment can be shared a license count, and any computing machine can be shared another license count.For the license based on token, can replace OLS token by occupancy permit token.Can be by every the unlimited number of times of equipment ground occupancy permit token.It exceeds and limits each license token and will there is no unit count, so that can only be used on an equipment.
Equipment (is for example applied, MOX and mobile application) can (for example pre-install via OEM, Windows moves) or download (for example, Android) via website and for example, issue by the application shop (, Apple shop) of platform.Per unit license can be obtained and not relate to OLS, OLS and relate to and buy that trustship or non-trustship are subscribed to or OLS relates to VL agreement via the application shop of platform.
Figure 18 A is the process flow diagram flow chart for the method 1800 of the application of initial permitted device.Method 180 starts at frame 1802, and wherein user is from the application shop down load application of equipment.1804, prompting user inputs his voucher.At frame 1806, user uses his Live ID or other vouchers to login.At frame 1808, equipment is inquired License Info with backward OLS, and at frame 1810, OLS return authorization string.At frame 1812, the authenticity of device authentication mandate string, preservation machine key and granted access.
At frame 1814, determine that whether equipment is authorized.If equipment is uncommitted, returns and make mistakes at frame 1816.If equipment is authorized, authorize the access right to application at frame 1818, until the periodic test of application or refitting.
Figure 18 B is the process flow diagram flow chart of the method 1820 of the state for periodically checking licence.In each embodiment, method 1820 is performed in response to being applied in the guiding first in a day.
Method 1820 starts at frame 1822, and wherein equipment is inquired license information to OLS.Equipment can by the definite interval of equipment (such as, every the 5th time login or monthly) inquire to OLS.At frame 1824, equipment is to OLS distribution of machine key.
At frame 1826, OLS is to equipment Returning equipment state.Be in already served situation in equipment state, authorize the access right to application, as shown in frame 1828.Be in to be converted or switched situation in equipment state, authorize string from OLS, again to be obtained, as shown in frame 1830., the in the situation that of having cancelled supply, to return and make mistakes in equipment state, as shown in frame 1832.
Figure 19 is the process flow diagram flow chart for the method 1900 of initial permitted device.The item of same numeral is described with reference to figure 18A.Method 1900 can be in response to application-specific the guiding first on equipment and being performed.
Method 1900 can be similar to the method 1800 of Figure 18 A.But, at frame 1902, prompting user input device token, and provide device token to user at frame 1904, but not login with his Live ID or other vouchers.Therefore,, according to method 1900, the licence of equipment is the licence based on token.For the license based on token, once licence is initialised, just for good and all permitted device is used this application.Therefore, can not there is not the periodicity licence inspection to this licence.Therefore, at frame 1906, equipment is for good and all authorized the access right to this application, or until the refitting of this application.
According to each embodiment described herein, OLS licence is the licence of the newtype that can be authorized by OLS.OLS licence can be provided by GetOLSLicense () API.(OLS licence can comprise licence string, MachineKey), machine identification (, MachineID), can bring into use date of expiration of this mandate and time (, and no longer can use date of expiration and the time (, TimeValidEnd) of this mandate TimeValidStart).
In the situation that OLS licence meets some criterions, equipment can only be fulfiled this OLS licence returning by GetOLSLicense () API.For example, OLS licence can be verified as by OLS and sign; Should ask, the MachineID returning can be verified as the MachineID that coupling is used; Should ask, TimeValidStart can be verified as the current time that coupling is used; And the current client computer time can be verified as between TimeValidStart and TimeValidEnd.
to the license of service
Each embodiment described herein can be used to carry out and each function relevant to the license of service.For example, each embodiment described herein can allow buddy identification user whether to be given the access right that its roaming is arranged to service.In addition, this type of embodiment can provide the interface for retrieving Office client computer information provision to Office service.
Figure 20 is that partner determines whether user is awarded the process flow diagram flow chart of the method 2000 of the access right to its service.This is determined and can make by service provision information.In certain embodiments, partner maintenance customer supply high-speed cache, and it is to carrying out high-speed cache from the result of GetEntitlementForIdentityEx () API Calls.This can strengthen partner's performance and reduce the load on OLS.The length that user supplies high-speed cache can regulate according to the characteristic of specific service.In addition, the performance cost that user supplies high-speed cache and can how long need real-time information once and call OLS for information provision based on service expires.
Method starts at frame 2002, wherein determines that user supplies whether high-speed cache exists and whether effective.If user supplies, high-speed cache exists and effectively, authorize the access right to service at frame 2004.If user supplies that high-speed cache does not exist or be invalid, at frame 2006, supplier calls GetEntitlementForIdentityEx () API.At frame 2008, partner upgrades user and supplies high-speed cache.Subsequently, at frame 2010, determine whether to user for serving.If do not supply serve to user, at frame 2012, do not authorize the access right to this service.Otherwise, at frame 2004, authorize the access right to this service to user.
geographic position and geographical scalable service
In each embodiment, geographic position and geographical zoom technology are used to improve or safeguard performance, availability, reliability and the scalability of OLS.The overall geographical Position Design of OLS can comprise master data center and numerous copy datas center, and it can be distributed in all over the world geographically.In this design theory, can support the copy data center of unlimited amount.Can reach the standard grade in due course in each copy data center.
All OLS operations can be processed in master data center.For example, first write operation (for example, supply is upgraded) can pass through master data center.Master data center can comprise the primary copy of each user's information provision.In addition, all synchronous supplier's assemblies and key cache assembly can reside in master data intracardiac.In addition, geographical synchronizer can be used to monitor constantly master data center to determine the renewal that will be synchronized to copy data center.
All read operations can be processed in copy data center, for example, check whether user obtains the permission of access services.Some write operations also can be processed in copy data center, for example, provide without key authorization.Each copy data center can comprise the copy of each user's information provision, and can continue to obtain from master data center supply renewal.In addition,, the in the situation that of disaster recovery scene, in copy data, in the heart any becomes master data center, as discussed further below.
Figure 21 is the schematic diagram of the exemplary configuration of master data center 2100 and multiple copy datas center 2102A and 2102B.Can give the direct URL (for example, master.ols.office.com) at OMEX 2104 or other partners one general purpose O LS URL (for example, generic.ols.office.com) and master data center 2100.For specific operation (such as, the synchronous supplier's 2106 of OMEX operation), OMEX 2104 can directly call master.ols.office.com instead of use generic.ols.office.com.Call subsequently any one that can the logic based in global load-balancing device 2108 be redirected to copy data center 2102A or 2102B from master data center 2100.
In addition, multiple geographical synchronizer 2110A and 2110B can be used in the future the independently information of data center 2100 and be synchronized to copy data center 2102A and 2102B.Particularly, each geographical synchronizer can be from the geographical synchronous meter reading out data in master data center 2100, and by these data write direct copy data center 2102A and 2102B.These type of data can comprise for example relevant with supply renewal or product key information updating data.
Geographical synchronous meter in master data center 2100 can comprise the pointer that can be synchronized to the record of copy data center 2102A or 2102B in sensing OLS core.Particularly, geographical synchronous meter can comprise SourceTable Name (source table name claims), SourcePartition Key (source partition key), SourceRow Key (source row key), ModifiedDateTime (amendment time on date) and PublishPending (waiting to announce) pointer.In OLS core table, write fashionable (except only affecting the writing of parameter in exception list) at every turn, be recorded in geographical synchronous meter and be created.
Although two geographical synchronizer 2110A and 2110B are only shown in Figure 21, configuration can comprise synchronizer 2110 ponds.In the time that each geographical synchronizer 2110 is revived, it attempts obtaining the locking for being synchronized to copy data center 2102A or 2102B.Any geographical synchronizer 2110 can be synchronized to any copy data center 2102A or 2102B.But a time, it can be movable that each copy data center 2102A or 2102B only have a geographical synchronizer 2110.Before attempting obtaining locking for being synchronized to next duplication centre 2102A or 2102B, each geographical synchronizer 2110 by has attempted for single copy data center 2102A or 2102B synchronously.In addition, all geographical synchronizers 2110 can be in the interior operation in master data center 2100.In each embodiment, master data center 2100 comprises lock arrangement file, and this lock arrangement file is listed PublishPending field corresponding in all copy datas center 2102A and 2102B, corresponding locking, corresponding Lockout Duration, geographical synchronous meter and opened or closed the switch of actual synchronization.In addition, in certain embodiments, centralized isochronous controller (not shown) can be used to manage the running of geographical synchronizer 2110.
Any amount of new copy data center can be put and reach the standard grade at any time.In the time reaching the standard grade in new copy data center, the configuration entry at new copy data center can be added in the lock arrangement file in master data center 2100.At first, configuration entry can be by new copy data centre mark for " closing " be to guarantee starting to follow the trail of the change at copy data center.Current time can be by remarks, and in master data center 2100 until all data of current time can be copied to new copy data center.Configuration entry can be " opening " by new copy data centre mark subsequently.Geographical synchronizing process can normally operate subsequently.
disaster recovery
According to each embodiment described herein, for example, the in the situation that of using multiple data centers (, a master data center and at least two copy data centers) permission to break down a data center, carry out disaster recovery in licensing system.For example, new data center can be put and reach the standard grade at any time, as the replacement data center of the data center having broken down.The in the situation that of having broken down at previous master data center, master data center is also promoted at copy data center.In addition, can put and realize a plan stop time at any time.
Disaster recovery process can be used to recover OLS data.Due to OLS, data are copied to these copy data centers from master data center, therefore in licensing system, be built with certain redundancy.But due to geographical synchronization delay, in each copy data, intracardiac data are named a person for a particular job at any time probably with master data center or are not 100% to be equal to other copy data centers.Therefore, some data may be lost in disaster event.In addition, OLS can comprise supply data, such as, qualification supply data, OMEX supply data and BPOS supply data.Recover although some supply datas can be supplied partner from OLS in disaster event, the supply data of certain tittle may be lost.Therefore it may be desirable, recovering these type of data.
scheduled Down Time
Figure 22 is the schematic diagram illustrating for the first step of executive plan stop time.First step can comprise and stopping providing service from calling of master data center 2200, and copy data center 2202 and 2204 is equal to, as described further below.
In some cases, can on purpose stop work in the master data center 2200 in OLS.For example, master data center 2200 can have the to be corrected fault configuration that has, and the main services of realizing maybe may there is can only stopping work at master data center 2200 that master data center 2200 can use time upgrades.
In the time will stopping work in master data center 2200, reach the standard grade as new master data center in main copy data center 2202.Main copy data center 2202 can be to be positioned at the copy data center that approaches master data center 2200, and will be thus lifted to the first copy data center at new master data center stop work at master data center 2200 in the situation that.
In certain embodiments, distribute a numeral to each data center, this numeral is since 1.For example, can be to master data center 2200 distribute digital 1, can be to main copy data center 2202 distribute digital 2, and can be to other copy data center 2204 distribute digital 3.Each data center 2200,2202 and 2204 can know its numeral that obtains distribution and maximum number certainly.This numbering system for during disaster scene, make specific determine for be useful.For example, if break down in master data center 2200, main copy data center 2204 can be thus lifted to new master data center automatically, and therefore its numeral is 2.If main copy data center 2204 is unavailable, copy data center 2204 can be thus lifted to new master data center subsequently, because its numeral is 3.
As discussed above, in executive plan stop time, first step can be to stop as providing service from calling of master data center 2200, and main copy data center 2202 is equal to.This can realize by remove master data center 2200 from general purpose O LS URL 2206 (, generic.ols.office.com) rotation.BPOS partner 2210 the synchronous supplier's 2208 of BPOS synchronizer assembly can be stopped, and issues assembly and can continue until nothing will be issued.All calling to main OLS URL 2212 (, master.ols.office.com) can be returned to TemporarilyUnavailable (temporarily unavailable) extremely.This comprises calling the synchronous supplier 2214 of OMEX partner 2216 OMEX, OLS API and OLS partner API.In addition, geographical synchronizer 2218 can continue geographical synchronizing process, until what does not have, other want synchronous.In the time that this process finishes, all copy datas center 2202 and 2204 will be synchronously can synchrodata from all of master data center 2200, and from any point see all and will be equal to master data center 2200.
Figure 23 is the schematic diagram for the second step of executive plan stop time.The item of same numeral is described with reference to Figure 22.Second step can relate to main copy data center 2202 is risen to new master data center, as described further below.
During this step of Scheduled Down Time, BPOS partner 2210 database can (, data center 2200) be copied to new master data center 2202 from old master data center.Lock arrangement file can be updated.The synchronous supplier 2214 of OMEX and the synchronous supplier's 2208 of BPOS all component can be opened in new master data center 2204.All OLS API and OLS partner API Calls can be opened in new master data center 2202.Main OLS USL 2212 can be mapped to new master data center 2202.In addition, copy data center 2204 can be designated as new main copy data center, and geographical synchronized process can be opened.
In the time that this step finishes, old main copy data center has been thus lifted to new master data center 2202.Thus, can stop work now to safeguard, upgrade etc. in old master data center 2200.These steps can be reversed, to old master data center 2200 is converted back to current master data center.
In certain embodiments, it may be desirable being reached the standard grade in new copy data center.New copy data center can be disposed by the lock arrangement file that the record at copy data center is added synchronously to the each data center that is configured to " closing ".If record is added, copy data center is actually new copy data center.Otherwise it is existing copy data center, and following steps are inapplicable.Once record is added to lock arrangement file, master data center just can start to collect the change that will be synchronized to new copy data center.Data can be copied to from master data center new copy data center.After having copied, new copy data center can be geographical synchronous for oneself opening in the lock arrangement file at master data center.In addition, the maximum quantity of data center can be updated in each data center.In addition new copy data center can be added, to the URL of global load-balancing.
nonscheduled down time
Nonscheduled down time can occur because of a variety of causes.Any nonscheduled down time at copy data center can be processed to be redirected to another copy data center flexibly by amendment global load-balancing device (for example, intermittence or lasting stop time).The maximum TTL time that can be depending on the DNS entry of global load-balancing device stop time.But the nonscheduled down time at master data center deals with more dumb.Because master data center is to carry out supply and for specific API Calls provides the unique data center of service, therefore the traffic can not be redirected to Backup Data center simply.
Become unavailable if master data center is unexpected within the time period extending, new master data center can be promoted in main copy data center.This can be by upgrading lock arrangement file, opening the synchronous supplier of BPOS in the heart and open the synchronous supplier of OMEX in the heart and realize in main copy data in main copy data.In addition, can in main copy data, open all OLS API and OLS partner API Calls in the heart, main OLS URL can be mapped to main copy data center, another copy data center can be appointed as to main copy data center, and can open geographical synchronized process.If new master data center is designated, and old master data center surprisingly recovers online, and data inconsistency can produce because old information geography is synchronized to these copy data centers by old master data center.Therefore, can take each step can not automatically recover online to guarantee old master data center.For example, configuration deployment can be used to close old master data center.
for applying conventional method and the system of license
Figure 24 is the process flow diagram flow chart of the method 2400 for applying license.In each embodiment, the licensed service (for example, OLS) in the licensing system that method 2400 is described is from here carried out.Method 2400 starts at frame 2402, wherein returns to the licence of application from licensed service to computing equipment.Licence can be in response to receive calling and being returned wherein user or its any combination of licence based on computing equipment or computing equipment of the card that asks for permission from computing equipment.In each embodiment, licence, based on multiple computing equipments, wherein can be specified by the condition of licence for the quantity of the computing equipment of licence.This application can be service, program or the application that can be provided by market service or third party's service.In addition, this licence can be the licence of multiple application or multiple services.In addition, this licence can be subscription license or permanent license.
At frame 2404, licensed service monitors the state of licence.The state that monitors licence can comprise detection fraudulent activities, and wherein fraudulent activities is the undelegated activity of condition of licence.In each embodiment, monitor that the state of licence comprises whether definite licence expires.Multiple computing equipments that the state of licence can use across user carry out synchronously.
At frame 2406, regulate the condition of licence according to the state of licence.In certain embodiments, regulate the condition of licence to be included in to cancel in the situation of license expiration for should licence.Regulating the condition of licence also can be included in again to supply in the situation that licence renewed by user should licence.
In certain embodiments, can allow user to use this application and without remaining connected to licensed service.But, can periodically ask user that computing equipment is connected to licensed service, to allow, the state of licence is monitored.At the appointed time in section be not connected to licensed service in the situation that, can cancel the supply to licence user.
The process flow diagram flow chart that should be appreciated that Figure 24 is not intended to each step of indicating means 2400 will be carried out or in each situation, all will comprise all steps with any certain order.In addition, depend on the details of specific implementation, any amount of additional step can be included in method 2400.
for the method for licensed service
Disclosed herein is a kind of method of licensed service.The method is included in licensed service and uses polling model to user or computing equipment or its any combination licensed service.In each embodiment, the another kind of method for licensed service also can be included in licensed service and use and push model to user or computing equipment licensed service.
for the method for business continuance is provided
Also disclose a kind of method that business continuance is provided herein, be included in data center or across multiple geographically process pools of the continuous distributing datas of data center of dispersion.In addition, disclosed herein is a kind of for the system of business continuance, robustness and redundancy is provided.This system comprises one group of locking, obtain one group of process and business datum or license data or both change queues of these lockings.This system also comprises across each data center manages the mechanism of these changes and writes this business datum or this license data or both mechanism.
use synchronous supplier to apply the method for license
Figure 25 is the process flow diagram flow chart for carry out the method 2500 of approved applications with synchronous supplier.Application to be permitted can be for example text processing application, spreadsheet application or demonstration application.In addition, this application can be the service that specific Business Partner provides.
The method starts at frame 2502, wherein receives the request of the licence to application from the synchronous supplier of client computer at licensed service place.In certain embodiments, the synchronous supplier of client computer is corresponding to specified client computing equipment, and licence permits using this application on this specified client computing equipment.In addition, in certain embodiments, the input of licence based on client certificates, permits using this application on client computes equipment.
At frame 2504, receive the information relevant with licence via the synchronous supplier of Business Partner from the Business Partner that this application is provided.In certain embodiments, licensed service comprises for synchronize multiple supply API that supplier communicates by letter with the synchronous supplier of Business Partner with client computer.
At frame 2506, return to the licence of this application to client computes equipment.At frame 2508, from client computer, synchronous supplier receives the information relevant with the state of licence.Also can be from receiving the information relevant with the state of licence from the synchronous supplier of Business Partner.In certain embodiments, the state of licence carries out synchronously across multiple client computes equipment corresponding with the synchronous supplier of client computer.In addition, in certain embodiments, the state of licence directly monitors via licensed service.
At frame 2510, regulate the condition of licence according to the state of licence.For example, the supply to licence can be in the situation that licence has expiration status, cancelled, or licence can be in the situation that licence has renewal state, again supplied.In addition, in the situation that having transition status, licence licence can be converted to different licences.
The process flow diagram flow chart that should be appreciated that Figure 25 is not intended to each step of indicating means 2500 will be carried out or in each situation, all will comprise all steps with any certain order.In addition, depend on the details of specific implementation, any amount of additional step can be included in method 2500.For example, in certain embodiments, method 2500 comprises that use can insert synchronous supplier's (comprising the synchronous supplier of one or more client computer and the synchronous supplier of multiple Business Partner) system and carry out approved applications.
for carry out the method for approved applications with the license of various ways
Figure 26 is the process flow diagram flow chart for carry out the method 2600 of approved applications with the license of various ways.The method starts at frame 2602, and the licence of the first form is wherein provided to the first computing equipment via licensed service.Can, in response to user's input (such as, the input of user's voucher or product key), provide the licence of the first form to the first computing equipment.At frame 2604, provide the licence of the second form to the second computing equipment via licensed service.Can, in response to user's input (such as, the input of user's voucher or product key), provide the licence of the second form to the second computing equipment.In each embodiment, the licence of the first form and the licence of the second form comprise the licence based on product key, the licence based on online user, the licence based on equipment, the licence based on token or its any combination.
At frame 2606, determine first state of licence of the first form and the second state of the licence of the second form, and at frame 2608, make the first state and the second state synchronized to form the license state through combination.In addition, at frame 2610, based on the condition that regulates licence through the license state of combination.In certain embodiments, comprise expiration status, renewal state, switched license state or effective status or its any combination through the license state of combination.If the license state through combination is expiration status, regulate the condition of licence can comprise the supply of cancelling licence.If the license state through combination is renewal state, regulate the condition of licence can comprise the supply of cancelling licence.If the license state through combination is effective status, can not regulate the condition of licence.If the license state through combination is switched license state, licence can be converted to different licences.
The process flow diagram flow chart that should be appreciated that Figure 26 is not intended to each step of indicating means 2600 will be carried out or in each situation, all will comprise all steps with any certain order.In addition, depend on the details of specific implementation, any amount of additional step can be included in method 2600.For example, method 2600 can comprise that wherein fraudulent activities comprises the undelegated activity of condition of licence based on detecting fraudulent activities through the license state of combination.Condition that subsequently can be based on the detection of fraudulent activities being regulated to licence.
be used for the method for the application of permitting each equipment
Figure 27 is for permitting the process flow diagram flow chart for the method 2700 of the application of each equipment.The method starts at frame 2702, wherein the licence of application is offered to multiple computing equipments that user is just using from licensed service.The licence of this application can comprise voucher.Can provide licence to each computing equipment in response to user's input.
At frame 2704, these vouchers can be associated with each in these computing equipments.For example, the mark of each computing equipment can be associated with these vouchers.Once these vouchers are associated with particular computing device, just can allow user at the appointed time on inherent this computing equipment of section, to use application, and without being connected to licensed service.
At frame 2706, periodically determine the state of the subscription corresponding with licence in each in computing equipment.In each embodiment, determine the state of the subscription on each computing equipment in specified configurable time period of the condition of licence.Can call the state of determining the subscription this computing equipment in response to the inspection subscription status receiving from computing equipment.Inspection subscription status is called the result that can comprise that the performed subscription status of this computing equipment checks.The state of subscription that subsequently can be based on each computing equipment regulates the condition of licence.For example, in the situation that subscription is expired in particular computing device, can cancel the supply to licence, or, in the situation that subscription is renewed in particular computing device, can again supply licence.In addition, in the situation that licence has been converted in specific particular computing device, licence can be converted to different licences.
The process flow diagram flow chart that should be appreciated that Figure 27 is not intended to each step of indicating means 2700 will be carried out or in each situation, all will comprise all steps with any certain order.In addition, depend on the details of specific implementation, any amount of additional step can be included in method 2700.
be used to application that the method for the licence based on user is provided
Figure 28 is the process flow diagram flow chart of the method 2800 for the license based on user to application is provided.The method starts at frame 2802, and wherein, in response to user's input, in licensed service, place receives user login information from computing equipment.User login information can be associated with licensed service or the Business Partner who is associated with licensed service.
At frame 2804, the licence of application is provided to computing equipment, wherein this licence comprises the device-specific information being associated with user.Device-specific information can comprise the information relevant with these computing equipments, on these computing equipments for user supplies to use application according to this licence.In addition, device-specific information can comprise and allows thereon to supply to use the sum of the computing equipment of application according to this licence to user.
At frame 2806, use the input of device-specific information on computing equipment, to activate application.Can allow subsequently user on computing equipment, to use application.In certain embodiments, allow user at the appointed time on the inherent computing equipment of section, to use application, and without computing equipment is connected to licensed service.
In certain embodiments, the state of licence can periodically be determined in response to the input from computing equipment, and wherein this input comprises the result that the performed license state of computing equipment checks.The state of licence can check in the configurable time period of licensed service or licence appointment itself.Subsequently can the state based on licence regulate the condition of licence.
The process flow diagram flow chart that should be appreciated that Figure 28 is not intended to each step of indicating means 2800 will be carried out or in each situation, all will comprise all steps with any certain order.In addition, depend on the details of specific implementation, any amount of additional step can be included in method 2800.For example, multiple computing equipments that the licence of application can use across user are roamed.
Although with architectural feature and/or method this theme that moved special language description, be appreciated that subject matter defined in the appended claims is not necessarily limited to above-mentioned specific features or action.More precisely, above-mentioned specific features and action are disclosed as the exemplary form that realizes claim.
Claims (10)
1. the method for coming approved applications (220) with synchronous supplier, comprising:
Locate to receive from the synchronous supplier of client computer (304D) request of the licence to application (220) in licensed service (302);
Receive (2504) information relevant with described licence via the synchronous supplier of Business Partner from the Business Partner that described application (220) is provided;
Return to the licence of (2506) described application (220) to client computes equipment (308);
Receive (2508) information relevant with the state of described licence from the synchronous supplier of described client computer (304D); And
Regulate the condition of (2510) described licence according to the state of described licence.
2. the method for claim 1, is characterized in that, receives the information relevant with the state of described licence from the synchronous supplier of described Business Partner.
3. the method for claim 1, it is characterized in that, comprise and carry out approved applications (220) by the system that can insert synchronous supplier, describedly insert synchronous supplier and comprise the synchronous supplier of one or more client computer (304D) and the synchronous supplier of multiple Business Partner.
4. the method for claim 1, is characterized in that, comprises the state synchronized that makes described licence across multiple client computes equipment (308) corresponding with the synchronous supplier of described client computer (304D).
5. the method for claim 1, is characterized in that, comprises expiration status at the state of described licence, cancels the supply to described licence.
6. the method for claim 1, is characterized in that, the state that is included in described licence comprises in the situation of renewal state, again supplies described licence.
7. the method for claim 1, is characterized in that, the state that is included in described licence is in the situation of transition status, and described licence is converted to the second licence.
8. the system for coming approved applications (220) with synchronous supplier, comprising:
The synchronous supplier of client computer (304D), it is configured to:
Receive supply request via the synchronous supplier of Business Partner from Business Partner;
Send request the system call of the licence to application (220) to licensed service (302); And
Periodically determine and upgrade the state of described licence; And
Licensed service (302), it is configured to:
Return to the licence to described application (220) to client computes equipment (308);
Receive the information relevant with the state of described licence from the synchronous supplier of described client computer (304D); And
Regulate the condition of described licence according to the state of described licence.
9. system as claimed in claim 8, it is characterized in that, what comprise the synchronous supplier of Business Partner and the synchronous supplier of client computer (304D) can insertion system, and wherein the synchronous supplier of each client computer (304D) is configured to receive license request from the synchronous supplier of one or more Business Partners.
10. system as claimed in claim 8, is characterized in that, comprises the system that is configured to make across multiple client computes equipment (308) corresponding with the synchronous supplier of described client computer (304D) state synchronized of described licence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610559853.8A CN106203001B (en) | 2012-01-27 | 2013-01-21 | Use the application license for the person of simultaneously providing |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261591703P | 2012-01-27 | 2012-01-27 | |
US61/591,703 | 2012-01-27 | ||
US13/681,425 | 2012-11-20 | ||
US13/681,425 US8925110B2 (en) | 2012-01-27 | 2012-11-20 | Application licensing using sync providers |
PCT/US2013/022357 WO2013112394A1 (en) | 2012-01-27 | 2013-01-21 | Application licensing using sync providers |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610559853.8A Division CN106203001B (en) | 2012-01-27 | 2013-01-21 | Use the application license for the person of simultaneously providing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104081406A true CN104081406A (en) | 2014-10-01 |
CN104081406B CN104081406B (en) | 2017-03-22 |
Family
ID=48871133
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610559853.8A Active CN106203001B (en) | 2012-01-27 | 2013-01-21 | Use the application license for the person of simultaneously providing |
CN201380006979.7A Active CN104081406B (en) | 2012-01-27 | 2013-01-21 | Application licensing using sync providers |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610559853.8A Active CN106203001B (en) | 2012-01-27 | 2013-01-21 | Use the application license for the person of simultaneously providing |
Country Status (18)
Country | Link |
---|---|
US (16) | US9165332B2 (en) |
EP (1) | EP2807593A4 (en) |
JP (1) | JP6257528B2 (en) |
KR (1) | KR102024406B1 (en) |
CN (2) | CN106203001B (en) |
AU (1) | AU2013212636B2 (en) |
BR (1) | BR112014018229B1 (en) |
CA (1) | CA2861222C (en) |
CL (1) | CL2014001974A1 (en) |
IL (1) | IL233435B (en) |
MX (1) | MX343626B (en) |
MY (1) | MY171045A (en) |
NZ (1) | NZ626700A (en) |
PH (1) | PH12014501521B1 (en) |
RU (1) | RU2628203C2 (en) |
SG (1) | SG11201404036WA (en) |
WO (1) | WO2013112394A1 (en) |
ZA (1) | ZA201404638B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109196501A (en) * | 2016-05-16 | 2019-01-11 | 歌乐株式会社 | Information terminal, communication terminal, server, license transfer system, license transfer method |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9055064B2 (en) * | 2009-12-28 | 2015-06-09 | Citrix Systems, Inc. | Systems and methods for a VPN ICA proxy on a multi-core system |
US9563751B1 (en) * | 2010-10-13 | 2017-02-07 | The Boeing Company | License utilization management system service suite |
US9165332B2 (en) * | 2012-01-27 | 2015-10-20 | Microsoft Technology Licensing, Llc | Application licensing using multiple forms of licensing |
US9836730B1 (en) * | 2013-03-14 | 2017-12-05 | Corel Corporation | Software product piracy monetization process |
US9569604B2 (en) * | 2013-04-15 | 2017-02-14 | International Business Machines Corporation | User access control to a secured application |
WO2015047127A1 (en) * | 2013-09-27 | 2015-04-02 | Emc Corporation | Flexible licensing architecture |
US10142378B2 (en) * | 2014-01-30 | 2018-11-27 | Symantec Corporation | Virtual identity of a user based on disparate identity services |
US9507921B2 (en) | 2014-04-07 | 2016-11-29 | Microsoft Technology Licensing, Llc | User-specific application activation for remote sessions |
GB2530973A (en) * | 2014-08-07 | 2016-04-13 | Greenman Gaming Ltd | Improved digital key distribution mechanism |
US10678880B2 (en) * | 2014-08-07 | 2020-06-09 | Greenman Gaming Limited | Digital key distribution mechanism |
US10015279B2 (en) | 2014-11-13 | 2018-07-03 | Blackberry Limited | Application assignment reconciliation and license management |
US9600810B2 (en) * | 2015-02-26 | 2017-03-21 | Blackberry Limited | License management for device management system |
JP6667993B2 (en) * | 2015-03-04 | 2020-03-18 | Line株式会社 | Server, server control method and program |
US10218817B2 (en) | 2015-04-28 | 2019-02-26 | Microsoft Technology Licensing, Llc | Digital rights list for device groups |
DE102015210294A1 (en) * | 2015-06-03 | 2016-12-08 | Siemens Aktiengesellschaft | Client device and server device for secure activation of functions of a client |
US10534778B2 (en) * | 2015-06-05 | 2020-01-14 | Apple Inc. | Search results based on subscription information |
US10061684B2 (en) | 2015-07-31 | 2018-08-28 | Microsoft Technology Licensing, Llc | Enhanced service validation |
JP6548525B2 (en) * | 2015-08-31 | 2019-07-24 | キヤノン株式会社 | License management system, client, license management method, and computer program |
US9825938B2 (en) * | 2015-10-13 | 2017-11-21 | Cloudpath Networks, Inc. | System and method for managing certificate based secure network access with a certificate having a buffer period prior to expiration |
JP6126193B1 (en) * | 2015-12-15 | 2017-05-10 | 株式会社オプティム | Application management system, application management method and program thereof |
KR20180096693A (en) * | 2015-12-21 | 2018-08-29 | 고릴라박스 게엠베하 아이. 지. | A method for reproducing an application from the cloud, a telecommunication network for streaming and reproducing an application (APP) via a specific telecommunication system, and a telecommunication network for streaming and reproducing an application (APP) |
US11516664B2 (en) | 2016-04-05 | 2022-11-29 | Carrier Corporation | Credential licensing service |
US10148665B2 (en) | 2016-05-10 | 2018-12-04 | Microsoft Technology Licensing, Llc | Self-service acquisition of subscriptions to online services |
US10394916B2 (en) | 2016-09-13 | 2019-08-27 | Microsoft Technology Licensing, Llc | Personalized search environment |
JP2018092548A (en) * | 2016-12-07 | 2018-06-14 | キヤノン株式会社 | License management system, license management method, information processing apparatus, and program |
US10657225B2 (en) | 2016-12-29 | 2020-05-19 | Red Hat, Inc. | Providing blockchain-based subscription-as-a-service management |
US10552601B2 (en) * | 2017-01-18 | 2020-02-04 | Red Hat, Inc. | Deferred subscription activation using blockchain |
US11244031B2 (en) * | 2017-03-09 | 2022-02-08 | Microsoft Technology Licensing, Llc | License data structure including license aggregation |
US20180307811A1 (en) * | 2017-04-19 | 2018-10-25 | Ice Frog Technologies, LLC | Prevention of software piracy exploiting end users |
US10620930B2 (en) | 2017-05-05 | 2020-04-14 | Servicenow, Inc. | Software asset management |
CN108170503B (en) * | 2018-01-24 | 2022-04-12 | 腾讯科技(深圳)有限公司 | Method, terminal and storage medium for cross-system android application running |
US11163728B2 (en) * | 2018-09-28 | 2021-11-02 | International Business Machines Corporation | Sharing container images utilizing a shared storage system |
US11388218B2 (en) * | 2019-03-28 | 2022-07-12 | Ctera Networks, Ltd. | Cloud file transfers using cloud file descriptors |
CN110008659B (en) * | 2019-03-29 | 2021-03-23 | 深圳华锐金融技术股份有限公司 | Software license offline management method and device, computer equipment and storage medium |
US11379561B2 (en) * | 2019-07-15 | 2022-07-05 | At&T Intellectual Property I, L.P. | License usage management |
US11336450B2 (en) | 2019-09-06 | 2022-05-17 | Jpmorgan Chase Bank, N.A. | System and method for implementing market data rights enforcement |
CN111143782B (en) * | 2019-11-08 | 2023-02-28 | 深圳市元征科技股份有限公司 | Application software authority management method and device, server and storage medium |
US11593463B2 (en) * | 2019-12-11 | 2023-02-28 | The Boeing Company | Execution type software license management |
US20210223942A1 (en) * | 2020-01-17 | 2021-07-22 | Apple Inc. | Systems and methods for changing representations of applications based on application status |
US20210390645A1 (en) * | 2020-06-16 | 2021-12-16 | OSAAP America, LLC | Offline License Distribution Device |
US11784875B1 (en) * | 2022-07-29 | 2023-10-10 | Cisco Technology, Inc. | Systems and methods for automatic license management of carrier neutral facility (CNF) services |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060161646A1 (en) * | 2005-01-19 | 2006-07-20 | Marc Chene | Policy-driven mobile forms applications |
CN101193102A (en) * | 2006-11-23 | 2008-06-04 | 中兴通讯股份有限公司 | A method for confirming license obtainment |
US20080300967A1 (en) * | 2007-06-04 | 2008-12-04 | David John Buckley | Interactive Marketing, Product/Market Research, Contact Access and Usage Tracking for Wireless |
US20100325702A1 (en) * | 2003-11-12 | 2010-12-23 | Min-Chieh Su | Authentication-authorization system for mobile communication terminal and method therefor |
US20110072431A1 (en) * | 2009-09-24 | 2011-03-24 | Oracle International Corporation | System and method for usage-based application licensing in a hypervisor virtual execution environment |
CN101996290A (en) * | 2009-08-13 | 2011-03-30 | 株式会社理光 | Program introduction supporting server, program introduction supporting system, program introduction supporting method, and program introduction supporting computer program |
Family Cites Families (170)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5138712A (en) | 1989-10-02 | 1992-08-11 | Sun Microsystems, Inc. | Apparatus and method for licensing software on a network of computers |
US5671412A (en) * | 1995-07-28 | 1997-09-23 | Globetrotter Software, Incorporated | License management system for software applications |
US7353396B2 (en) | 1995-10-02 | 2008-04-01 | Corestreet, Ltd. | Physical access control |
US5790664A (en) | 1996-02-26 | 1998-08-04 | Network Engineering Software, Inc. | Automated system for management of licensed software |
US20010011253A1 (en) | 1998-08-04 | 2001-08-02 | Christopher D. Coley | Automated system for management of licensed software |
US5758069A (en) | 1996-03-15 | 1998-05-26 | Novell, Inc. | Electronic licensing system |
DE19612999C2 (en) * | 1996-03-22 | 1999-04-01 | Wasy Ges Fuer Wasserwirtschaft | System for protecting protected software against unauthorized use in computer networks |
DE69719084T2 (en) | 1997-03-21 | 2003-12-11 | Canal & Technologies Paris | CHIP CARD AND RECEIVER FOR RECEIVING ENCRYPTED BROADCASTING SIGNALS |
EP1653463A1 (en) * | 1997-05-13 | 2006-05-03 | Kabushiki Kaisha Toshiba | License information copying method and apparatus, license information moving method |
US6189146B1 (en) | 1998-03-18 | 2001-02-13 | Microsoft Corporation | System and method for software licensing |
US7171662B1 (en) | 1998-03-18 | 2007-01-30 | Microsoft Corporation | System and method for software licensing |
US6049789A (en) | 1998-06-24 | 2000-04-11 | Mentor Graphics Corporation | Software pay per use licensing system |
US7228437B2 (en) | 1998-08-13 | 2007-06-05 | International Business Machines Corporation | Method and system for securing local database file of local content stored on end-user system |
US6510466B1 (en) | 1998-12-14 | 2003-01-21 | International Business Machines Corporation | Methods, systems and computer program products for centralized management of application programs on a network |
US6510513B1 (en) | 1999-01-13 | 2003-01-21 | Microsoft Corporation | Security services and policy enforcement for electronic data |
US6766305B1 (en) * | 1999-03-12 | 2004-07-20 | Curl Corporation | Licensing system and method for freely distributed information |
US7073063B2 (en) * | 1999-03-27 | 2006-07-04 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like |
US6697948B1 (en) * | 1999-05-05 | 2004-02-24 | Michael O. Rabin | Methods and apparatus for protecting information |
IL150225A0 (en) * | 1999-12-15 | 2002-12-01 | Cubist Pharm Inc | Lipopeptides, pharmaceutical compositions containing the same and methods for the production thereof |
JP4120125B2 (en) | 2000-02-01 | 2008-07-16 | 富士ゼロックス株式会社 | License issuing device and method |
DE10155752A1 (en) | 2001-11-14 | 2003-05-22 | Siemens Ag | Licensing software modules for industrial controllers, regulators and/or computer systems, involves using software module carrying with it information regarding licensing requirement |
AU2001266692A1 (en) | 2000-06-02 | 2001-12-11 | John Denton Biddle | System and method for licensing management |
CA2313298A1 (en) * | 2000-06-07 | 2001-12-07 | Webhancer Corporation | Method and system for selectively receiving content over a communications network based on network communication speed |
GB0017201D0 (en) | 2000-07-14 | 2000-08-30 | Ibm | Generalised program hooks |
AU2001286410A1 (en) | 2000-07-31 | 2002-02-13 | Morphics Technology, Inc. | Method and apparatus for time-sliced and multi-threaded data processing in a communication system |
US6857067B2 (en) | 2000-09-01 | 2005-02-15 | Martin S. Edelman | System and method for preventing unauthorized access to electronic data |
ES2166739B1 (en) * | 2000-10-16 | 2002-12-16 | Advanced Fiber Optics S L | OPTICAL FIBER LIGHT CONDUCTORS. |
US6957276B1 (en) | 2000-10-23 | 2005-10-18 | Microsoft Corporation | System and method of assigning and reclaiming static addresses through the dynamic host configuration protocol |
EP2378733B1 (en) | 2000-11-10 | 2013-03-13 | AOL Inc. | Digital content distribution and subscription system |
JP2002169620A (en) | 2000-12-01 | 2002-06-14 | Konami Co Ltd | Management system for game device, game device, control method, software recording medium |
US7386513B2 (en) | 2001-01-17 | 2008-06-10 | Contentguard Holdings, Inc. | Networked services licensing system and method |
EP1243998B1 (en) | 2001-03-21 | 2017-04-19 | Excalibur IP, LLC | A technique for license management and online software license enforcement |
US6993664B2 (en) | 2001-03-27 | 2006-01-31 | Microsoft Corporation | Method and system for licensing a software product |
EP1479016A2 (en) * | 2001-05-29 | 2004-11-24 | Matsushita Electric Industrial Co., Ltd. | Rights management unit |
US7343297B2 (en) | 2001-06-15 | 2008-03-11 | Microsoft Corporation | System and related methods for managing and enforcing software licenses |
US7203966B2 (en) | 2001-06-27 | 2007-04-10 | Microsoft Corporation | Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices |
JP2003023177A (en) * | 2001-07-06 | 2003-01-24 | Sharp Corp | Method of manufacturing semiconductor light emitting element |
EP1428098B1 (en) * | 2001-08-01 | 2006-12-20 | Matsushita Electric Industrial Co., Ltd. | Device and method for managing content usage right |
US7120429B2 (en) * | 2001-08-13 | 2006-10-10 | Qualcomm Inc. | System and method for licensing applications on wireless devices over a wireless network |
US7716137B2 (en) | 2001-08-14 | 2010-05-11 | Nokia Inc. | System and method for automatically tracking and enabling the operation of a product |
US7174383B1 (en) | 2001-08-31 | 2007-02-06 | Oracle International Corp. | Method and apparatus to facilitate single sign-on services in a hosting environment |
US20030084145A1 (en) | 2001-11-01 | 2003-05-01 | Arun Ramachandran | Usage based licensing server process to generate metrics |
US20030083998A1 (en) | 2001-11-01 | 2003-05-01 | Arun Ramachandran | Usage based licensing server and data structure |
AU2002350203A1 (en) | 2001-11-20 | 2003-06-10 | Contentguard Holdings, Inc. | Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates |
US7096203B2 (en) | 2001-12-14 | 2006-08-22 | Duet General Partnership | Method and apparatus for dynamic renewability of content |
US7140042B2 (en) | 2002-01-14 | 2006-11-21 | Mcafee, Inc. | System and method for preventing software piracy |
US6915278B1 (en) | 2002-03-22 | 2005-07-05 | Borland Software Corporation | License management method and system |
WO2003096136A2 (en) | 2002-05-10 | 2003-11-20 | Protexis Inc. | System and method for multi-tiered license management and distribution using networked clearinghouses |
NO20023194D0 (en) * | 2002-07-01 | 2002-07-01 | Sospita As | Method and apparatus for executing software applications in a multiprocessor environment |
US8041642B2 (en) | 2002-07-10 | 2011-10-18 | Avaya Inc. | Predictive software license balancing |
US7627633B2 (en) | 2002-08-30 | 2009-12-01 | The Go Daddy Group, Inc. | Proxy email method and system |
US20040068734A1 (en) | 2002-10-07 | 2004-04-08 | Microsoft Corporation | Software license isolation layer |
US7934263B2 (en) | 2002-12-17 | 2011-04-26 | Sony Pictures Entertainment Inc. | License management in a media network environment |
WO2004057446A2 (en) | 2002-12-19 | 2004-07-08 | International Business Machines Corporation | A method for providing of content data to a client |
US7596625B2 (en) | 2003-01-27 | 2009-09-29 | Microsoft Corporation | Peer-to-peer grouping interfaces and methods |
US7703128B2 (en) | 2003-02-13 | 2010-04-20 | Microsoft Corporation | Digital identity management |
US7318236B2 (en) | 2003-02-27 | 2008-01-08 | Microsoft Corporation | Tying a digital license to a user and tying the user to multiple computing devices in a digital rights management (DRM) system |
US7127442B2 (en) | 2003-04-01 | 2006-10-24 | Avaya Technology Corp. | Ironclad notification of license errors |
JP4424465B2 (en) * | 2003-06-09 | 2010-03-03 | ソニー株式会社 | Information device, information server, and information processing program |
TW200507579A (en) | 2003-06-10 | 2005-02-16 | Matsushita Electric Ind Co Ltd | License distribution method, information content providing method and relevant system |
US20040267609A1 (en) | 2003-06-24 | 2004-12-30 | Mccauley David R. | Methods and systems for specifying and distributing consumer information |
US20040267590A1 (en) | 2003-06-30 | 2004-12-30 | International Business Machines Corporation | Dynamic software licensing and purchase architecture |
US7089594B2 (en) | 2003-07-21 | 2006-08-08 | July Systems, Inc. | Application rights management in a mobile environment |
JP3931869B2 (en) | 2003-08-14 | 2007-06-20 | ソニー株式会社 | Information processing apparatus, information recording medium, information processing method, and computer program |
US20050049976A1 (en) | 2003-08-26 | 2005-03-03 | Yang Harold (Haoran) | Remotely licensing configurable network diagnostic modules |
US20050049973A1 (en) * | 2003-09-02 | 2005-03-03 | Read Mark A. | Method and program for automated management of software license usage by monitoring and disabling inactive software products |
US20050071663A1 (en) | 2003-09-26 | 2005-03-31 | General Instrument Corporation | Separation of copy protection rules for digital rights management |
WO2005033892A2 (en) | 2003-10-03 | 2005-04-14 | Sony Electronics, Inc. | Rendering rights delegation system and method |
US8103592B2 (en) | 2003-10-08 | 2012-01-24 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf of first process |
US10437964B2 (en) * | 2003-10-24 | 2019-10-08 | Microsoft Technology Licensing, Llc | Programming interface for licensing |
EP1686519A4 (en) | 2003-11-21 | 2008-05-28 | Matsushita Electric Ind Co Ltd | License acquiring system, server apparatus and terminal apparatus |
WO2005064484A1 (en) * | 2003-12-25 | 2005-07-14 | Mitsubishi Denki Kabushiki Kaisha | Digital content use right management system |
US7113765B2 (en) * | 2004-01-13 | 2006-09-26 | Qualcomm Inc. | System and method for allowing user based application licensing across multiple wireless communications devices |
US8843413B2 (en) | 2004-02-13 | 2014-09-23 | Microsoft Corporation | Binding content to a domain |
CN1954543A (en) * | 2004-04-14 | 2007-04-25 | 数码河股份有限公司 | Geographic location based licensing system |
US8271390B2 (en) | 2004-06-14 | 2012-09-18 | Nokia Corporation | Digital rights management (DRM) license manager |
US8099791B1 (en) | 2004-06-25 | 2012-01-17 | Lexmark International, Inc. | Method of authenticating a consumable in an imaging device |
US7363623B2 (en) * | 2004-08-05 | 2008-04-22 | Canon Kabushiki Kaisha | Services of remote software installation, configuration and afterward support, for network connected peripherals |
JP2006059164A (en) * | 2004-08-20 | 2006-03-02 | Fujitsu Support & Service Kk | License management terminal, license management system, license management program, and license management method |
JP4827467B2 (en) * | 2004-09-10 | 2011-11-30 | キヤノン株式会社 | License transfer system and license information issuing server |
US7493487B2 (en) | 2004-10-15 | 2009-02-17 | Microsoft Corporation | Portable computing environment |
US20060089917A1 (en) * | 2004-10-22 | 2006-04-27 | Microsoft Corporation | License synchronization |
US7464103B2 (en) | 2004-10-29 | 2008-12-09 | Microsoft Corporation | Multi-level nested open hashed data stores |
US20060106726A1 (en) | 2004-11-18 | 2006-05-18 | Contentguard Holdings, Inc. | Method, system, and device for license-centric content consumption |
US8660961B2 (en) * | 2004-11-18 | 2014-02-25 | Contentguard Holdings, Inc. | Method, system, and device for license-centric content consumption |
US8818899B2 (en) | 2005-01-19 | 2014-08-26 | Blackberry Limited | Method and apparatus for deploying and licensing wireless communication device computer software infrastructure to manufacturers |
US7890428B2 (en) | 2005-02-04 | 2011-02-15 | Microsoft Corporation | Flexible licensing architecture for licensing digital application |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US8732087B2 (en) | 2005-07-01 | 2014-05-20 | The Invention Science Fund I, Llc | Authorization for media content alteration |
US20070263865A1 (en) | 2005-07-01 | 2007-11-15 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Authorization rights for substitute media content |
US20070027815A1 (en) | 2005-07-29 | 2007-02-01 | Symantec Corporation | Systems and methods for centralized subscription and license management in a small networking environment |
US20070033395A1 (en) * | 2005-08-02 | 2007-02-08 | Macrovision | Method and system for hierarchical license servers |
US20070050471A1 (en) | 2005-08-31 | 2007-03-01 | Microsoft Corporation | Portable Remoting Component With A Scaleable Feature Set |
US8682795B2 (en) | 2005-09-16 | 2014-03-25 | Oracle International Corporation | Trusted information exchange based on trust agreements |
US8417641B1 (en) | 2006-01-31 | 2013-04-09 | Kyocera Corporation | System for licensing mobile applications, features, and devices |
US20070266421A1 (en) | 2006-05-12 | 2007-11-15 | Redcannon, Inc. | System, method and computer program product for centrally managing policies assignable to a plurality of portable end-point security devices over a network |
US7792756B2 (en) | 2006-06-27 | 2010-09-07 | Microsoft Corporation | Subscription management in a media sharing service |
US7849017B2 (en) * | 2006-06-29 | 2010-12-07 | Flexera Software, Inc. | Enforced seat-based licensing |
ATE407588T1 (en) * | 2006-07-28 | 2008-09-15 | Lowe Alpine Holdings Ltd | ADJUSTABLE HIP BELT AND BACKPACK WITH SUCH A HIP BELT |
CN101127064A (en) * | 2006-08-18 | 2008-02-20 | 华为技术有限公司 | Method and system for backuping and resuming licence |
EP1901191B1 (en) * | 2006-09-18 | 2013-02-27 | Siemens Enterprise Communications GmbH & Co. KG | Method and system for administration of licences |
US8184692B2 (en) | 2006-09-25 | 2012-05-22 | Framecaster, Inc. | Distributed and automated video encoding and delivery system |
US20080215450A1 (en) | 2006-09-28 | 2008-09-04 | Microsoft Corporation | Remote provisioning of information technology |
US20080083040A1 (en) | 2006-09-29 | 2008-04-03 | Microsoft Corporation | Aggregated resource license |
US8474027B2 (en) | 2006-09-29 | 2013-06-25 | Microsoft Corporation | Remote management of resource license |
US20080103977A1 (en) * | 2006-10-31 | 2008-05-01 | Microsoft Corporation | Digital rights management for distributed devices |
US20080109911A1 (en) | 2006-11-03 | 2008-05-08 | Microsoft Corporation | Send/Lend Business Rights |
US8107626B2 (en) | 2006-11-22 | 2012-01-31 | The Directv Group, Inc. | Method and system for enabling transfer of content between a storage device and a portable media player device |
US20080141378A1 (en) | 2006-12-12 | 2008-06-12 | Mclean Ivan Hugh | Method and apparatus for creating licenses in a mobile digital rights management network |
JP4909044B2 (en) | 2006-12-14 | 2012-04-04 | キヤノン株式会社 | License management system and control method thereof, image forming apparatus and control method thereof |
US20080148363A1 (en) | 2006-12-15 | 2008-06-19 | Nbc Universal, Inc. | Digital rights management copy sharing system and method |
US10120983B2 (en) * | 2006-12-15 | 2018-11-06 | Nbcuniversal Media, Llc | Digital rights management flexible continued usage system and method |
US20080222044A1 (en) | 2007-03-05 | 2008-09-11 | Microsoft Corporation | Protected content renewal |
EP2140393A1 (en) | 2007-03-20 | 2010-01-06 | Dmvich Software, Llc | Refreshing software licenses |
US20080235141A1 (en) | 2007-03-21 | 2008-09-25 | Microsoft Corporation | License manager and schema |
US20080243699A1 (en) | 2007-03-29 | 2008-10-02 | Microsoft Corporation | License optimization and automated management |
US7644044B2 (en) | 2007-04-04 | 2010-01-05 | Sony Corporation | Systems and methods to distribute content over a network |
US20080256646A1 (en) * | 2007-04-12 | 2008-10-16 | Microsoft Corporation | Managing Digital Rights in a Member-Based Domain Architecture |
US8307404B2 (en) | 2007-04-16 | 2012-11-06 | Microsoft Corporation | Policy-management infrastructure |
US7865444B1 (en) * | 2007-06-12 | 2011-01-04 | Adobe Systems Incorporated | License tracking and management |
US8474054B2 (en) * | 2007-06-26 | 2013-06-25 | Digital Keystone, Inc. | Systems and methods for conditional access and digital rights management |
US20090037287A1 (en) | 2007-07-31 | 2009-02-05 | Ahmad Baitalmal | Software Marketplace and Distribution System |
CA2639720A1 (en) | 2007-09-21 | 2009-03-21 | Neurolanguage Corporation | Community based internet language training providing flexible content delivery |
KR100917312B1 (en) | 2007-09-27 | 2009-09-11 | (주) 엘지텔레콤 | System and Method for Renewal Information of DRM Contents for Repurchase and Recording Medium for Recording Function Therefore |
US10013536B2 (en) | 2007-11-06 | 2018-07-03 | The Mathworks, Inc. | License activation and management |
EP2223256A1 (en) | 2007-11-17 | 2010-09-01 | Uniloc Usa, Inc. | System and method for adjustable licensing of digital products |
US8544105B2 (en) | 2007-12-24 | 2013-09-24 | Qualcomm Incorporated | Method and apparatus for managing policies for time-based licenses on mobile devices |
US20090192943A1 (en) | 2008-01-28 | 2009-07-30 | Microsoft Corporation | Renewing an Expired License |
US20090222926A1 (en) | 2008-02-28 | 2009-09-03 | Honeywell International Inc. | Software license management system that functions in a disconnected or intermittently connected mode |
US8321948B2 (en) * | 2008-03-28 | 2012-11-27 | Sap Ag | Flexible appliance hosting with coordination of deployment, licensing and configuration |
US20090254482A1 (en) | 2008-04-07 | 2009-10-08 | Microsoft Corporation | Time-based licenses |
US20090259591A1 (en) | 2008-04-11 | 2009-10-15 | Microsoft Corporation | Information Rights Management |
CN101743747B (en) * | 2008-06-17 | 2012-05-02 | 索尼计算机娱乐公司 | Information processing device |
US20090326964A1 (en) | 2008-06-25 | 2009-12-31 | Microsoft Corporation | Extensible agent-based license structure |
US20100031372A1 (en) | 2008-07-29 | 2010-02-04 | Memory Experts International Inc. | Method and system for secure flexible software licensing |
JP2010086461A (en) * | 2008-10-02 | 2010-04-15 | Sony Corp | License management device and license management method, and license management system |
GB2466220A (en) * | 2008-12-12 | 2010-06-16 | Symbian Software Ltd | Installing or uninstalling computer programs using installer plug-in modules |
JP5335504B2 (en) | 2009-03-19 | 2013-11-06 | キヤノン株式会社 | Application packaging apparatus, control method thereof, and program |
US20120029681A1 (en) | 2009-04-07 | 2012-02-02 | Semco Corporation | Image engraving device |
US9424399B2 (en) | 2009-05-12 | 2016-08-23 | Microsoft Technology Licensing, Llc | Availability of permission models in roaming environments |
US20100293103A1 (en) | 2009-05-12 | 2010-11-18 | Microsoft Corporation | Interaction model to migrate states and data |
US20100293536A1 (en) | 2009-05-12 | 2010-11-18 | Microsoft Corporation | Enhanced product functionality based on user identification |
US20100333212A1 (en) | 2009-06-25 | 2010-12-30 | Microsoft Corporation | Portable parameter-based licensing |
US9015818B2 (en) | 2009-07-31 | 2015-04-21 | Adobe Systems Incorporated | Software application operational transfer |
US20110061047A1 (en) * | 2009-09-04 | 2011-03-10 | Alcatel Lucent | Licensing Software and Licensing Propagation Mechanism for Embedded Systems in Chassis and Stacked Environments |
JP5413078B2 (en) | 2009-09-14 | 2014-02-12 | 株式会社リコー | Device management system, device management device, mediation device, device management method, and device management program |
US8484454B2 (en) * | 2009-10-19 | 2013-07-09 | Honeywell Asca Inc. | Secure offline relocation of portable software licenses |
JP5454102B2 (en) * | 2009-11-25 | 2014-03-26 | 株式会社リコー | License update management apparatus, license management system, license update method, and program |
US9971880B2 (en) | 2009-11-30 | 2018-05-15 | Red Hat, Inc. | Verifying software license compliance in cloud computing environments |
JP4764943B2 (en) * | 2009-12-29 | 2011-09-07 | シャープ株式会社 | Operation control apparatus, operation control method, license providing system, operation control program, and recording medium |
US20110208797A1 (en) | 2010-02-22 | 2011-08-25 | Full Armor Corporation | Geolocation-Based Management of Virtual Applications |
US8402139B2 (en) | 2010-02-26 | 2013-03-19 | Red Hat, Inc. | Methods and systems for matching resource requests with cloud computing environments |
US20110251937A1 (en) | 2010-04-09 | 2011-10-13 | International Business Machines Corporation | Software license brokering within a cloud computing environment |
CN105760716B (en) | 2010-05-19 | 2018-12-14 | 谷歌有限责任公司 | Digital certificates management |
US20120024670A1 (en) * | 2010-07-29 | 2012-02-02 | Robert Koerselman | Adjustable Rotational Discharge Assembly for a Conveyor |
CN102376064A (en) | 2010-08-12 | 2012-03-14 | 威睿公司 | Elastic permission of software in cloud environment |
US9081937B2 (en) * | 2010-08-26 | 2015-07-14 | Adobe Systems Incorporated | Systems and methods for managing subscription-based licensing of software products |
BR112013006560A2 (en) | 2010-09-21 | 2016-06-07 | Gen Instrument Corp | Secure high volume resource license provisioning system |
US20120079095A1 (en) | 2010-09-24 | 2012-03-29 | Amazon Technologies, Inc. | Cloud-based device synchronization |
US8970668B2 (en) | 2010-11-29 | 2015-03-03 | Verizon Patent And Licensing Inc. | High bandwidth streaming to media player |
US20120158415A1 (en) | 2010-12-17 | 2012-06-21 | Flexera Software Inc. | method and system for license server synchronization |
US20120255033A1 (en) | 2011-03-28 | 2012-10-04 | Microsoft Corporation | Licensing software on a single-user basis |
US9152771B2 (en) | 2011-05-31 | 2015-10-06 | Qualcomm Incorporated | Apparatus and method of managing a licensable item |
US9524378B2 (en) | 2011-05-31 | 2016-12-20 | Qualcomm Incorporated | Apparatus and method of in-application licensing |
US8800058B2 (en) | 2011-07-27 | 2014-08-05 | Microsoft Corporation | Licensing verification for application use |
US20130144633A1 (en) | 2011-12-01 | 2013-06-06 | Microsoft Corporation | Enforcement and assignment of usage rights |
US20130144755A1 (en) | 2011-12-01 | 2013-06-06 | Microsoft Corporation | Application licensing authentication |
US9245096B2 (en) | 2012-01-24 | 2016-01-26 | International Business Machines Corporation | Software license management in a networked computing environment |
US8725650B2 (en) | 2012-01-26 | 2014-05-13 | Microsoft Corporation | Document template licensing |
US9165332B2 (en) | 2012-01-27 | 2015-10-20 | Microsoft Technology Licensing, Llc | Application licensing using multiple forms of licensing |
-
2012
- 2012-11-18 US US13/680,105 patent/US9165332B2/en active Active
- 2012-11-19 US US13/680,121 patent/US9594884B2/en active Active
- 2012-11-19 US US13/680,120 patent/US8832851B2/en active Active
- 2012-11-20 US US13/681,425 patent/US8925110B2/en active Active
- 2012-11-26 US US13/684,587 patent/US9384516B2/en active Active
-
2013
- 2013-01-21 MY MYPI2014702048A patent/MY171045A/en unknown
- 2013-01-21 NZ NZ626700A patent/NZ626700A/en unknown
- 2013-01-21 EP EP13741059.3A patent/EP2807593A4/en not_active Withdrawn
- 2013-01-21 SG SG11201404036WA patent/SG11201404036WA/en unknown
- 2013-01-21 AU AU2013212636A patent/AU2013212636B2/en active Active
- 2013-01-21 CA CA2861222A patent/CA2861222C/en active Active
- 2013-01-21 WO PCT/US2013/022357 patent/WO2013112394A1/en active Application Filing
- 2013-01-21 JP JP2014554759A patent/JP6257528B2/en active Active
- 2013-01-21 KR KR1020147021035A patent/KR102024406B1/en active IP Right Grant
- 2013-01-21 MX MX2014008562A patent/MX343626B/en active IP Right Grant
- 2013-01-21 RU RU2014130991A patent/RU2628203C2/en active
- 2013-01-21 CN CN201610559853.8A patent/CN106203001B/en active Active
- 2013-01-21 CN CN201380006979.7A patent/CN104081406B/en active Active
- 2013-01-21 BR BR112014018229-9A patent/BR112014018229B1/en active IP Right Grant
-
2014
- 2014-06-24 ZA ZA2014/04638A patent/ZA201404638B/en unknown
- 2014-06-29 IL IL233435A patent/IL233435B/en active IP Right Grant
- 2014-06-30 PH PH12014501521A patent/PH12014501521B1/en unknown
- 2014-07-25 CL CL2014001974A patent/CL2014001974A1/en unknown
- 2014-08-13 US US14/459,055 patent/US20150007340A1/en not_active Abandoned
- 2014-09-22 US US14/493,226 patent/US20150012447A1/en not_active Abandoned
- 2014-12-05 US US14/561,963 patent/US9449354B2/en active Active
- 2014-12-08 US US14/563,816 patent/US9269115B2/en active Active
-
2015
- 2015-03-19 US US14/662,915 patent/US9406095B2/en active Active
- 2015-03-19 US US14/663,366 patent/US20150193607A1/en not_active Abandoned
- 2015-03-19 US US14/663,343 patent/US20150193606A1/en not_active Abandoned
- 2015-03-19 US US14/663,328 patent/US20150193605A1/en not_active Abandoned
- 2015-03-19 US US14/663,388 patent/US20150193897A1/en not_active Abandoned
- 2015-03-19 US US14/663,375 patent/US20150186625A1/en not_active Abandoned
-
2016
- 2016-06-23 US US15/191,202 patent/US20160300317A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100325702A1 (en) * | 2003-11-12 | 2010-12-23 | Min-Chieh Su | Authentication-authorization system for mobile communication terminal and method therefor |
US20060161646A1 (en) * | 2005-01-19 | 2006-07-20 | Marc Chene | Policy-driven mobile forms applications |
CN101193102A (en) * | 2006-11-23 | 2008-06-04 | 中兴通讯股份有限公司 | A method for confirming license obtainment |
US20080300967A1 (en) * | 2007-06-04 | 2008-12-04 | David John Buckley | Interactive Marketing, Product/Market Research, Contact Access and Usage Tracking for Wireless |
CN101996290A (en) * | 2009-08-13 | 2011-03-30 | 株式会社理光 | Program introduction supporting server, program introduction supporting system, program introduction supporting method, and program introduction supporting computer program |
US20110072431A1 (en) * | 2009-09-24 | 2011-03-24 | Oracle International Corporation | System and method for usage-based application licensing in a hypervisor virtual execution environment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109196501A (en) * | 2016-05-16 | 2019-01-11 | 歌乐株式会社 | Information terminal, communication terminal, server, license transfer system, license transfer method |
CN109196501B (en) * | 2016-05-16 | 2022-03-18 | 歌乐株式会社 | Information terminal, communication terminal, server, license transfer system, and license transfer method |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104081406A (en) | Application licensing using sync providers | |
NZ551117A (en) | Software distribution framework | |
AU2015202352A1 (en) | Reusable license activation key | |
JP6818309B1 (en) | Deadline management server, agent program and terminal lending system | |
US20140136416A1 (en) | Method and system for license server synchronization | |
US9361435B1 (en) | Multi-tier digital supply chain management | |
AU2013200648A1 (en) | Software distribution framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
ASS | Succession or assignment of patent right |
Owner name: MICROSOFT TECHNOLOGY LICENSING LLC Free format text: FORMER OWNER: MICROSOFT CORP. Effective date: 20150721 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20150721 Address after: Washington State Applicant after: Micro soft technique license Co., Ltd Address before: Washington State Applicant before: Microsoft Corp. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |